Some risks don’t breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats weren’t the loudest—they were the most legitimate-looking. In an environment where identity, trust, and tooling…
Third-Party Breach Impacts Majority of Allianz Life US Customers
Insurance firm Allianz Life said that a threat actor accessed personally identifiable information of the majority of its 1.4 million US customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Third-Party Breach Impacts Majority of Allianz Life…
IT Security News Hourly Summary 2025-07-28 15h : 10 posts
10 posts were published in the last hour 13:3 : Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception 13:3 : How E2B became essential to 88% of Fortune 100 companies and raised $21 million 13:3 : New Wyze lamp socket powers…
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for as little as $300 per month, marking a fundamental shift in the cybercrime scene. These services eliminate the need for…
How E2B became essential to 88% of Fortune 100 companies and raised $21 million
AI infrastructure startup E2B secures $21 million funding with 88% Fortune 100 adoption rate, powering secure AI agent deployments at scale. This article has been indexed from Security News | VentureBeat Read the original article: How E2B became essential to…
New Wyze lamp socket powers your outdoor Cam, and turns your dumb bulb smart – here’s how
The Wyze Lamp Socket v2 can power your Wyze Cam and, in turn, enables your outdoor lighting to work intelligently with your camera. This article has been indexed from Latest news Read the original article: New Wyze lamp socket powers…
I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)
The Dell Premium 16 is a sleek follow-up to the iconic XPS line with impressive hardware and stunning 4K touchscreen. This article has been indexed from Latest news Read the original article: I tested the Dell XPS’ successor – here…
DLP and DSPM: Navigate policy challenges and quiet alert noise
<p>At a data security seminar in July, I had the opportunity to sit down with practitioners and talk about data loss prevention challenges and how <a href=”https://www.techtarget.com/searchsecurity/definition/data-security-posture-management-DSPM”>data security posture management</a> connected to their <a href=”https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP”>DLP</a> strategies. The challenges these defenders…
Root Evidence Launches With $12.5 Million in Seed Funding
Root Evidence is developing fully integrated vulnerability scanning and attack surface management technology. The post Root Evidence Launches With $12.5 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Root…
Startup Sells Stolen Personal Data Online for $50, Raising Alarms Over Privacy and Ethics
A new controversy is brewing over a U.S.-based startup accused of making stolen personal data widely accessible—for as little as $50. Farnsworth Intelligence, founded by 23-year-old Aidan Raney, is openly marketing a product called “Infostealers,” which allows customers to…
Atomic macOS Stealer Upgraded with Remote Access Backdoor
The Atomic macOS Stealer (AMOS), a notorious infostealer malware targeting Apple’s macOS ecosystem, has undergone a significant upgrade by incorporating a sophisticated backdoor mechanism that facilitates persistent access and remote command execution on infected systems. This enhancement, detailed in a…
Aeroflot aeroflops over ‘IT issues’ after attackers claim year-long compromise
Russia’s top airline cancels 49 flights, delays affect many more Russia’s largest airline, Aeroflot, canceled numerous flights on Monday morning following what it says was a failure in its IT systems – something hacktivists are claiming responsiblity for.… This article…
Scattered Spider Targeting VMware vSphere Environments
The financially motivated group is pivoting from Active Directory to VMware vSphere environments, deploying ransomware from the hypervisor. The post Scattered Spider Targeting VMware vSphere Environments appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Tea App Breach: Women Only Dating Platform Leaks 72K User Images
The “Tea” app, a new and popular social platform for women, confirmed a major data breach affecting users… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Tea App…
Inside Muddled Libra’s Playbook: Call Center Attacks for Initial Breach
Palo Alto Networks’ Unit 42, the cybercrime group tracked as Muddled Libra also known as Scattered Spider or UNC3944 has demonstrated remarkable resilience and adaptation in 2025, following international law enforcement disruptions in late 2024. Despite federal charges against five…
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
A critical new threat targeting Microsoft SharePoint servers through a sophisticated exploit chain dubbed “ToolShell.” This multi-stage attack combines previously patched vulnerabilities with fresh zero-day exploits to achieve complete system compromise, affecting SharePoint Enterprise Server 2016, SharePoint Server 2019, and…
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations
A major cybersecurity breach has exposed the browsing activities of users visiting one of the internet’s most notorious illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard discovered an unprotected Elasticsearch database containing approximately 22 million records of web requests,…
Allianz Life Data Breach Impacts Most of 1.4 Million US Customers
Allianz subsidiary said the information of customers, financial professionals and employees was compromised as a result of a hack. The post Allianz Life Data Breach Impacts Most of 1.4 Million US Customers appeared first on SecurityWeek. This article has been…
Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach
Picture this: you’ve hardened every laptop in your fleet with real‑time telemetry, rapid isolation, and automated rollback. But the corporate mailbox—the front door for most attackers—is still guarded by what is effectively a 1990s-era filter. This isn’t a balanced approach.…
Naval Group Denies Hack Claims, Alleges “Reputational Attack”
Despite claims by a hacker, French defense company Naval Group has detected no intrusions into its IT environments at the time of writing This article has been indexed from www.infosecurity-magazine.com Read the original article: Naval Group Denies Hack Claims, Alleges…
Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also tracked as Void Blizzard as a sophisticated Russian state-sponsored advanced persistent threat (APT) group active since at least April 2024. This actor has focused on…
Scattered Spider targets VMware ESXi in using social engineering
Scattered Spider targets VMware ESXi in North America using social engineering, mainly fake IT help desk calls instead of software exploits. The cybercrime group Scattered Spider (aka 0ktapus, Muddled Libra, Octo Tempest, and UNC3944) is targeting VMware ESXi hypervisors in…
Microsoft SharePoint Zero-Day
Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint to steal data worldwide: The vulnerability, tracked as CVE-2025-53770, carries a severity rating of 9.8 out of a possible 10. It gives unauthenticated remote access to SharePoint Servers exposed to…
IT Security News Hourly Summary 2025-07-28 12h : 7 posts
7 posts were published in the last hour 10:2 : Hackers Breach Intelligence Portal Used by the CIA and Other Agencies 9:33 : This 16-inch Acer is a full-package value pick I’d happily replace my main laptop with 9:33 :…