A critical Local File Inclusion (LFI) vulnerability was recently discovered in Microsoft 365’s Export to PDF functionality, potentially allowing attackers to access sensitive server-side data, including configuration files, database credentials, and application source code. The vulnerability, reported by security researcher…
Splunk Address Third-Party Packages Vulnerabilities in SOAR Versions – Update Now
Splunk has released critical security updates addressing multiple vulnerabilities in third-party packages in SOAR versions 6.4.0 and 6.4. Published on July 7, 2025, this comprehensive security update remediates various Common Vulnerabilities and Exposures (CVEs) ranging from medium to critical severity…
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack
A sophisticated supply chain attack has compromised ETHcode, a popular Visual Studio Code extension for Ethereum development, through a malicious GitHub pull request that required just two lines of code to weaponize the trusted software. The attack, discovered by ReversingLabs…
Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server
Microsoft has released critical security updates to address CVE-2025-47981, a severe heap-based buffer overflow vulnerability in the SPNEGO Extended Negotiation (NEGOEX) Security Mechanism that affects multiple Windows and Windows Server versions. This vulnerability carries a CVSS score of 9.8 out…
Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)
There are several reasons why one would set up an internal certificate authority. Some are configured to support strong authentication schemes, some for additional flexibility and convenience. I am going to cover the second part. In particular, it can be…
Supply Chain Attack Unleashed via Compromised VS Code Extension
A sophisticated supply chain attack targeting cryptocurrency developers through the compromise of ETHcode, a legitimate Visual Studio Code extension with nearly 6,000 installations. The attack, executed through a malicious GitHub pull request, demonstrates how threat actors can weaponize trusted development…
Reflectiz Joins the Datadog Marketplace
Boston, Massachusetts, 9th July 2025, CyberNewsWire The post Reflectiz Joins the Datadog Marketplace appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Reflectiz Joins the Datadog Marketplace
Axis Max Life Cyberattack: A Warning to the Indian Insurance Sector
On July 2, 2025, Max Financial Services revealed a cybersecurity incident targeting its subsidiary, Axis Max Life Insurance, India’s fifth-largest life insurer. This incident raises severe concerns regarding data security and threat detection in the Indian insurance sector. The…
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with malware capable of harvesting sensitive data from compromised hosts. The activity has been attributed by Trellix Advanced Research Center to an advanced…
Ameos-Kliniken: IT-Ausfall schränkt Röntgen- & Laboruntersuchungen teilweise ein
Der Klinikkonzern Ameos kämpft aktuell mit einem großen IT-Ausfall. Davon sind alle deutschen Standorte betroffen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Ameos-Kliniken: IT-Ausfall schränkt Röntgen- & Laboruntersuchungen teilweise ein
Update nicht verteilt: Mainboard-Hersteller laut AMD schuld an ungefixtem TPM-Bug
Schon seit 2022 hat AMD einen Fix für einen Bug, der Windows-Nutzer mit aktivem Bitlocker aussperren kann. Doch die Mainboard-Hersteller liefern nicht. (TPM, Prozessor) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Update nicht verteilt:…
SparkKitty Malware Steals Photos from iOS and Android Devices
A sophisticated Trojan malware campaign has been targeting mobile device users across iOS and Android platforms since February 2024, with cybersecurity researchers identifying a significant escalation in photo theft capabilities that poses particular risks to cryptocurrency users and individuals storing…
June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats
Cyber criminals continue to innovate, with a recent innovation involving the hijacking of expired Discord vanity invite links to silently deliver malicious payloads. This new campaign, discovered by Check Point Research, delivers AsyncRAT, now ranked number 3 among Top Malware…
Red Hat introduces Enterprise Linux for Business Developers
Red Hat announced Red Hat Enterprise Linux for Business Developers to simplify access to the world’s leading enterprise Linux platform for business-focused development and testing scenarios. A new self-service offering through the Red Hat Developer Program, Red Hat Enterprise Linux…
AlertMedia Incident Response improves coordination and visibility into resolving incidents
AlertMedia launched Incident Response, an addition to its AI-enabled platform designed to help organizations mitigate risks and resolve incidents faster. When impacted by critical events like natural disasters, workplace or public safety emergencies, cybersecurity incidents, and system failures, organizations often…
Ransomware Attack Stops Nova Scotia Power Meter Readings
Nova Scotia Power revealed that a ransomware attack has prevented meters from sending energy usage data to its systems, impacting billing This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attack Stops Nova Scotia Power Meter Readings
VdS 2100-47: Neue Richtlinien für Sprinkler-Dieselmotoren
Erstmals bringt VdS eigene Richtlinien für Sprinkler-Dieselmotoren – für zuverlässigen Brandschutz auch bei Stromausfall. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: VdS 2100-47: Neue Richtlinien für Sprinkler-Dieselmotoren
Microsoft Fixes Wormable Remote Code Execution Flaw in Windows and Server
Microsoft has released critical security updates addressing a severe remote code execution vulnerability that could allow attackers to execute malicious code across networks without user interaction. The vulnerability, tracked as CVE-2025-47981, affects Windows client machines running Windows 10 version 1607…
TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions
A new Android vulnerability called TapTrap that allows malicious apps to bypass the operating system’s permission system without requiring any special permissions themselves. The attack exploits activity transition animations—a core feature of Android’s user interface—to trick users into unknowingly granting…
Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates
An Iranian ransomware group, Pay2Key.I2P, has intensified attacks on U.S. and Israeli targets, offering affiliates higher profits. The Iranian ransomware group Pay2Key.I2P is stepping up attacks on U.S. and Israeli targets, luring affiliates with higher profit shares. The ransomware gang…
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack
Nippon Steel Solutions has disclosed a data breach that resulted from the exploitation of a zero-day in network equipment. The post Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack appeared first on SecurityWeek. This article has been indexed from…
FUNNULL Uses Amazon and Microsoft Cloud to Hide Malicious Infrastructure
A sophisticated threat network called “Triad Nexus,” which operates through the FUNNULL content delivery network (CDN) to hide malicious infrastructure within major Western cloud providers including Amazon and Microsoft. The operation, led by sanctioned individual Lizhi Liu, has facilitated over…
Can’t quit Windows 10? Here’s how to keep getting security updates after October 2025
Businesses can expect to pay a premium for Windows 10 Extended Security Updates, while educators will pay next to nothing. And for the first time, consumers can sign up, with some options that are completely free. This article has been…
Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions – Update Now
Splunk has released critical security updates addressing multiple Common Vulnerabilities and Exposures (CVEs) in third-party packages across Enterprise versions 9.4.3, 9.3.5, 9.2.7, 9.1.10, and higher. Published on July 7, 2025, these updates remediate high-severity vulnerabilities in essential components, including setuptools,…