The federal government has applied for forfeiture of the funds, which were seized by FBI Dallas in April 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang
IT Security News Hourly Summary 2025-07-29 12h : 7 posts
7 posts were published in the last hour 10:3 : Insights from Talos IR: Navigating NIS2 technical implementation 10:3 : Charity Fined After Destroying “Irreplaceable” Records 9:33 : Triage is Key! Python to the Rescue!, (Tue, Jul 29th) 9:33 :…
How Scattered Spider Used Fake Calls to Breach Clorox via Cognizant
Specops Software’s analysis reveals how Scattered Spider’s persistent help desk exploitation cost Clorox $400 million. Understand the August 2023 breach, its operational disruption, and critical steps organisations must take to protect against similar social engineering threats. This article has been…
Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet
A law requiring UK internet users to verify their age to access adult content has led to a huge surge in VPN downloads—and has experts worried about the future of free expression online. This article has been indexed from Security…
Trump’s cybersecurity cuts putting nation at risk, warns New York cyber chief
The top cybersecurity official in New York told TechCrunch in an interview that Trump’s budget cuts are going to put the government at risk from cyberattacks, and will put more pressure on states to secure themselves. This article has been…
From Ex Machina to Exfiltration: When AI Gets Too Curious
From prompt injection to emergent behavior, today’s curious AI models are quietly breaching trust boundaries. The post From Ex Machina to Exfiltration: When AI Gets Too Curious appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Cyware expands Intelligence Suite to streamline CTI program deployment and operations
Cyware expanded its Cyware Intelligence Suite, an enhanced threat intelligence program-in-a-box that consolidates threat management capabilities into a streamlined, logical workflow. The expansion enables security teams to operationalize threat intelligence more easily and improve security posture faster. The Cyware Intelligence…
Gunra Ransomware Group Unveils Efficient Linux Variant
This blog discusses how Gunra ransomware’s new Linux variant accelerates and customizes encryption, expanding the group’s reach with advanced cross-platform tactics. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Gunra Ransomware Group…
Huawei Hits China Top Spot As Apple Returns To Growth
Huawei tops smartphone shipments in China for first quarter in more than a year, as Apple returns to growth but trails rivals This article has been indexed from Silicon UK Read the original article: Huawei Hits China Top Spot As…
Samsung In $16.5bn Deal To Make AI Chips For Tesla
Samsung to manufacture next-gen AI6 chip for Tesla in new Texas plant, as electric carmaker shifts focus to self-driving taxis, robots This article has been indexed from Silicon UK Read the original article: Samsung In $16.5bn Deal To Make AI…
EU Says Temu Not Doing Enough To Bar Illegal Products
European Commission says Temu potentially in violation of Digital Services Act as billions of low-value parcels flood into bloc This article has been indexed from Silicon UK Read the original article: EU Says Temu Not Doing Enough To Bar Illegal…
Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights
A cyberattack claimed by Ukrainian group Silent Crow and Belarusian Cyber-Partisans crippled Aeroflot ’s systems, canceling over 100 flights. On July 28, 2025, a cyberattack claimed by Ukrainian group Silent Crow and Belarusian Cyber-Partisans crippled the systems of Russian state-owned…
Apple’s New Containerization Feature Allows Kali Linux Integration on macOS
Apple quietly slipped a game-changing developer feature into its WWDC 25 announcements: a native containerization stack that lets Macs run Open Container Initiative (OCI) images inside ultra-lightweight virtual machines. In practice, that means you can launch a full Kali Linux…
CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical vulnerability in PaperCut NG/MF print management software that threat actors are actively exploiting in ransomware campaigns. The vulnerability, tracked as CVE-2023-2533, represents a significant security risk to organizations worldwide using the…
10 Best Virtual Machine (VM) Monitoring Tools in 2025
VM (Virtual Machine) monitoring tools are essential for maintaining the performance, availability, and security of virtualized environments. These tools provide real-time visibility into VM health and performance, enabling administrators to track key metrics such as CPU usage, memory utilization, disk…
Insights from Talos IR: Navigating NIS2 technical implementation
ENISA’s 2025 NIS2 guidance makes compliance more complex, but Talos IR’s services directly align with new requirements for reporting, logging and incident response. This article has been indexed from Cisco Talos Blog Read the original article: Insights from Talos IR:…
Charity Fined After Destroying “Irreplaceable” Records
A Scottish charity has been fined £18,000 for systematic data protection failings This article has been indexed from www.infosecurity-magazine.com Read the original article: Charity Fined After Destroying “Irreplaceable” Records
Triage is Key! Python to the Rescue!, (Tue, Jul 29th)
When you need to quickly analyze a lot of data, there is one critical step to perform: Triage. In forensic investigations, this step is critical because it allows investigators to quickly identify, prioritize, and isolate the most relevant or high…
Linux 6.16 Released with Performance and Networking Enhancements
Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of what he described as a “nice and calm” development cycle. The latest stable release brings numerous performance improvements, networking enhancements,…
Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration and illicit sale of corporate databases. This group employs an opportunistic approach to target selection, with a notable preference for…
The best online photo editors: Expert tested and reviewed
A good online photo editor can help you perfect your images, no matter what device you’re using. These are my tried and tested favorites. This article has been indexed from Latest news Read the original article: The best online photo…
Organizations Warned of Exploited PaperCut Flaw
Threat actors are exploiting a two-year-old vulnerability in PaperCut that allows them to execute arbitrary code remotely. The post Organizations Warned of Exploited PaperCut Flaw appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC) framework, potentially exposing sensitive user data including files protected by privacy controls and information cached by Apple Intelligence. Vulnerability Overview…
Linux 6.16 brings faster file systems, improved confidential memory support, and more Rust support
Linux continues to grow bigger and better. Here’s what’s new and notable in the 6.16 release, plus what you need to know about 6.17. This article has been indexed from Latest news Read the original article: Linux 6.16 brings faster…