The cybersecurity landscape faces a renewed threat as TA829, a sophisticated threat actor group, has emerged with enhanced tactics, techniques, and procedures (TTPs) alongside an upgraded version of the notorious RomCom backdoor. This hybrid cybercriminal-espionage group has demonstrated remarkable adaptability,…
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection
A sophisticated new variation of cyberattacks emerged in July 2025, exploiting a critical vulnerability in how Chrome and Microsoft Edge handle webpage saving functionality. The attack, dubbed “FileFix 2.0,” bypasses Windows’ Mark of the Web (MOTW) security feature by leveraging…
UK eyes new laws as cable sabotage blurs line between war and peace
It might be time to update the Submarine Telegraph Act of 1885 Cyberattacks and undersea cable sabotage are blurring the line between war and peace and exposing holes in UK law, a government minister has warned lawmakers.… This article has…
Qantas Data Breach Impacts Up to 6 Million Customers
Australian airline Qantas says personal information stolen from systems hosting the service records of 6 million customers. The post Qantas Data Breach Impacts Up to 6 Million Customers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Cyberattack Targets International Criminal Court
The International Criminal Court (ICC) has detected and contained a sophisticated and targeted cyberattack. The post Cyberattack Targets International Criminal Court appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Cyberattack Targets International Criminal…
CISA Warns of Two Exploited TeleMessage Vulnerabilities
CISA says two more vulnerabilities in the messaging application TeleMessage TM SGNL have been exploited in the wild. The post CISA Warns of Two Exploited TeleMessage Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage
Businesses must take the threat of identity-based attacks seriously and adapt their cybersecurity practices to address this challenge. The post How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage appeared first on Security Boulevard. This article…
Guiding Global Teams: Fostering Compliance and Creativity
With empowered advocates and continuous measurement, teams can navigate the fine line between compliance, rule adherence and creative freedom. The post Guiding Global Teams: Fostering Compliance and Creativity appeared first on Security Boulevard. This article has been indexed from Security…
Qantas Reveals “Significant” Contact Center Data Breach
Qantas admits that a “significant” volume of customer data may have been stolen from a contact center This article has been indexed from www.infosecurity-magazine.com Read the original article: Qantas Reveals “Significant” Contact Center Data Breach
IT Security News Hourly Summary 2025-07-02 09h : 8 posts
8 posts were published in the last hour 7:4 : Does U.S. traffic control still use floppy disks? 7:4 : Top 6 Passwordless Authentication Solutions 7:4 : Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages…
Cloudflare To Block AI Crawlers By Default
Online infrastructure company Cloudlfare to block AI crawlers for new customers by default as publishers seek accountability This article has been indexed from Silicon UK Read the original article: Cloudflare To Block AI Crawlers By Default
ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits
ESET experts discuss Sandworm’s new data wiper, UnsolicitedBooker’s relentless campaigns, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4…
ESET Threat Report H1 2025: Key findings
ESET Chief Security Evangelist Tony Anscombe reviews some of the report’s standout findings and their implications for organizations in 2025 and beyond This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025: Key findings
Google issues Chrome security update, ICC targeted by new attack, Microsoft nixes Authenticator password management
Chrome Zero-Day CVE-2025-6554 under active attack — Google issues security update International Criminal Court targeted by new ‘sophisticated’ attack Kelly Benefits says 2024 data breach impacts 550,000 customers, Esse Health says recent data breach affects over 263,000 patients Huge thanks…
Does U.S. traffic control still use floppy disks?
Yes, it does; as of June 2025, the U.S.’s air traffic control (ATC) system continues to rely on decades-old technology that includes floppy disks and… The post Does U.S. traffic control still use floppy disks? appeared first on Panda Security…
Top 6 Passwordless Authentication Solutions
Discover the top passwordless authentication solutions that can enhance security and user experience. Find the best solution for your business needs. This article has been indexed from Security | TechRepublic Read the original article: Top 6 Passwordless Authentication Solutions
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale
Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. “This observation signals a new evolution in the weaponization of Generative AI by threat…
U.S. Treasury Sanctions Bulletproof Hosting Firm Fueling Ransomware Campaigns
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has imposed sweeping sanctions on Aeza Group, a Russia-based bulletproof hosting (BPH) provider, for its pivotal role in enabling global cybercrime, including ransomware attacks, data theft, and illicit drug…
Over 600K WordPress Sites at Risk Due to Critical Plugin Vulnerability
A critical security flaw in the popular Forminator WordPress plugin has put more than 600,000 websites worldwide at risk of remote takeover, according to recent disclosures from security firm Wordfence and independent researchers. The vulnerability, tracked as CVE-2025-6463 and rated 8.8 (High) on the…
Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines
The notorious North Korean threat group Kimsuky has adopted a sophisticated social engineering tactic known as “ClickFix” to deceive users into executing malicious scripts on their own systems. Originally introduced by Proofpoint researchers in April 2024, this deceptive technique tricks…
Scamnetic KnowScam 2.0 helps consumers detect every type of scam
Scamnetic releaseed KnowScam 2.0, its flagship product for scam protection and digital identity verification. KnowScam 2.0 builds on everything users already trust — now with major upgrades, including an enhanced three-point scoring system, the new Auto Scan feature for Microsoft…
Exabeam Nova Advisor Agent equips security leaders with a real-time strategic planning engine
Exabeam announced a major expansion of its integrated multi-agent AI system Exabeam Nova that now equips security leaders with a real-time strategic planning engine and boardroom communication tool. The Exabeam Nova Advisor Agent is the AI capability designed to turn…
Cybersecurity essentials for the future: From hype to what works
Cybersecurity never stands still. One week it’s AI-powered attacks, the next it’s a new data breach, regulation, or budget cut. With all that noise, it’s easy to get distracted. But at the end of the day, the goal stays the…
Anthropic MCP Inspector Vulnerability Lets Hackers Run Arbitrary Code Remotely
A newly disclosed vulnerability in Anthropic’s Model Context Protocol (MCP) Inspector tool has sent shockwaves through the AI development community, exposing a critical attack vector that could allow hackers to execute arbitrary code on developers’ machines—simply by luring them to…
How FinTechs are turning GRC into a strategic enabler
In this Help Net Security interview, Alexander Clemm, Corp GRC Lead, Group CISO, and BCO at Riverty, shares how the GRC landscape for FinTechs has matured in response to tighter regulations and global growth. He discusses the impact of frameworks…
Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is available in storage capacities ranging from 4GB to 512GB and holds FIPS 140-2 Level 3 validation. The device is OS-agnostic,…
Secretless Broker: Open-source tool connects apps securely without passwords or keys
Secretless Broker is an open-source connection broker that eliminates the need for client applications to manage secrets when accessing target services like databases, web services, SSH endpoints, or other TCP-based systems. Secretless Broker features “We created Secretless Broker to solve…