Tag: computer
-
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Tags: access, attack, authentication, business, citrix, computer, control, credentials, cve, cvss, data, email, espionage, exploit, grc, microsoft, monitoring, network, ransomware, remote-code-execution, risk, sap, service, threat, update, vulnerability, windowsNetwork security: Allow PKU2U authentication requests to this computer to use online identities“.Tyler Reguly, Fortra’s associate director of security R&D, told CSO that, based on Microsoft’s presentation of the information, disabling this GPO will mitigate this vulnerability.The second priority is a fix for CVE-2025-49704, a SharePoint Remote Code Execution vulnerability, because it presents a critical risk to a…
-
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Tags: access, attack, authentication, business, citrix, computer, control, credentials, cve, cvss, data, email, espionage, exploit, grc, microsoft, monitoring, network, ransomware, remote-code-execution, risk, sap, service, threat, update, vulnerability, windowsNetwork security: Allow PKU2U authentication requests to this computer to use online identities“.Tyler Reguly, Fortra’s associate director of security R&D, told CSO that, based on Microsoft’s presentation of the information, disabling this GPO will mitigate this vulnerability.The second priority is a fix for CVE-2025-49704, a SharePoint Remote Code Execution vulnerability, because it presents a critical risk to a…
-
Chinese national arrested in Milan after US issues arrest warrant for Hafnium attacks
The Justice Department confirmed the arrest in a statement, unsealing a nine-count indictment on Tuesday accusing Xu and co-defendant Zhang Yu of being involved in “computer intrusions between February 2020 and June 2021, including the indiscriminate HAFNIUM computer intrusion campaign that compromised thousands of computers worldwide, including in the United States.” First seen on therecord.media…
-
New LogoKit Phishing Campaign Exploits Cloudflare Turnstile and Amazon S3 for Higher Success Rates
Cyble Research and Intelligence Labs (CRIL) recently discovered a very advanced phishing campaign that used the LogoKit phishing kit, which was initially discovered in 2021, to pose as reliable organizations such as Hungary’s Computer Emergency Response Team (HunCERT). This ongoing operation targets a diverse range of sectors, including banking and logistics, with a global reach…
-
MediaTek July”¯2025 Security Update Addresses Multiple Chipset Vulnerabilities
MediaTek has released a comprehensive security bulletin addressing 16 critical vulnerabilities across its extensive chipset portfolio, including smartphone, tablet, AIoT, smart display, smart platform, OTT, computer vision, audio, and TV chipsets. The July 2025 security update reveals seven high-severity and nine medium-severity vulnerabilities that could potentially compromise device security through various attack vectors including remote code execution,…
-
Drei zentrale Cybersicherheitsrisiken von Quantencomputing
Heute verschlüsselte Daten, die künftig entschlüsselt werden könnten. Manipulation der Blockchain. Quantenresistente Ransomware. Es ist eines der drängendsten technologischen Themen der kommenden Dekade: die zunehmende Relevanz von Quantencomputern und deren mögliche Auswirkungen auf die digitale Sicherheit. Als Cybersicherheitsrisiken gelten verschlüsselte Daten, die künftig entschlüsselt werden könnten, Manipulation der Blockchain und quantenresistente Ransomware. Klassische Computer stoßen……
-
Call of Duty takes PC game offline after multiple reports of RCE attacks on players
Gamemakers have only said they are investigating an unspecified “issue.” Players are posting videos of their computers being compromised. First seen on cyberscoop.com Jump to article: cyberscoop.com/call-of-duty-remote-code-execution-pc-game-offline/
-
Ransomware-Attacke auf Ingram Micro
Die Webseiten von Ingram Micro sind aufgrund einer Cyberattacke aktuell nicht erreichbar. Screenshot by Foundry / Julia MutzbauerDie Internetseiten des globalen IT-Distributors Ingram Micro sind laut Aussagen von Kunden seit vergangenen Donnerstag (3. Juli 2025) nicht mehr erreichbar. Auch die deutsche Website ist betroffen. Dort heißt es, dass die Seite aufgrund von ‘Wartungsarbeiten” derzeit nicht…
-
Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can be exploited to bypass AppLocker restrictions. The file in question, C:\Windows\MFGSTAT.zip, is present on many Lenovo machines that ship with the manufacturer’s default Windows image. This issue, initially thought to affect only a handful of…
-
Cl0p Ransomware’s Exfiltration Process Exposes RCE Vulnerability
Tags: computer, cyber, cybercrime, data, data-breach, flaw, group, incident response, ransomware, rce, remote-code-execution, vulnerabilityA newly disclosed vulnerability in the Python-based data-exfiltration utility used by the notorious Cl0p ransomware group has exposed the cybercrime operation itself to potential attack. The flaw, cataloged as GCVE-1-2025-0002, was identified by Italian security researcher Lorenzo N and published by the Computer Incident Response Center Luxembourg (CIRCL) on July 1, 2025. Vulnerability Details The…
-
Data breach at healthcare services firm Episource affects 5.4M
The incident, one of the largest breaches reported to federal regulators this year, came after a cybercriminal accessed data on the company’s computer systems over the winter. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/episource-healthcare-data-breach-impacts-5-4-million/751960/
-
Cyberangriff auf eine Stadtverwaltung in Wyoming, USA
Green River City Computer Systems Crippled by Ransomware First seen on sweetwaternow.com Jump to article: www.sweetwaternow.com/green-river-city-computer-systems-crippled-by-ransomware/
-
Cybersecurity Snapshot: U.S. Gov’t Urges Adoption of Memory-Safe Languages and Warns About Iran Cyber Threat
Tags: access, advisory, ai, api, attack, authentication, best-practice, cisa, computer, computing, crypto, cryptography, cyber, cybersecurity, data, defense, encryption, exploit, finance, framework, google, governance, government, group, hacker, healthcare, infrastructure, injection, intelligence, Internet, iran, login, mfa, military, mitigation, mitre, network, nist, passkey, password, programming, ransomware, risk, rust, service, software, strategy, tactics, technology, terrorism, threat, tool, training, vulnerability, warfareCheck out the U.S. government’s latest call for developers to use memory-safe programming languages, as well as its warning for cybersecurity teams regarding cyber risk from hackers tied to Iran. Plus, get the latest on ransomware trends, the quantum computing cyber threat and more! Dive into five things that are top of mind for the…
-
Ciaran Martin: AI might disturb attacker-defender security balance
The founder of the National Cyber Security Centre spoke with Computer Weekly at Infosecurity Europe 2025 about how artificial intelligence might disturb the attacker-defender security equilibrium First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626443/Ciaran-Martin-AI-might-disturb-attacker-defender-security-balance
-
Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
The Iranian threat group Educated Manticore, also tracked as APT35, APT42, Charming Kitten, or Mint Sandstorm, has intensified its cyber-espionage operations targeting Israeli cybersecurity experts, computer science professors, and journalists. Associated with the Islamic Revolutionary Guard Corps’ Intelligence Organization (IRGC-IO), this advanced persistent threat (APT) group has been under scrutiny by Check Point Research for…
-
LinuxFest Northwest: My Journey Using Linux From Scratch And Why You Should Try It Too
Author/Presenter: Nathaniel Smith (Bellevue College, Baccalaureate Program Undergraduate In Computer Science) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located at the Bellingham Technical College in Bellingham, Washington; and via the…
-
Israeli cyber and computer science experts phished by Iran-linked APT42
Tel Aviv-based Check Point says an Iranian group tracked as APT42, Educated Manticore, Charming Kitten and Mint Sandstorm used email and messaging apps to get Israeli targets to give up information like two-factor authentication codes. First seen on therecord.media Jump to article: therecord.media/israel-cyber-experts-computer-scientists-phished-iran
-
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel.”In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistants to First seen on…
-
Computer vision research feeds surveillance tech as patent links spike 5×
Tags: computerA bottomless appetite for tracking people as “objects” First seen on theregister.com Jump to article: www.theregister.com/2025/06/25/computer_vision_research_surveillance/
-
The tiny amplifier that could supercharge quantum computing
Quantum computers are built to handle problems that are far too complex for today’s machines. They could lead to major advances in areas like drug development, encryption, AI, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/25/quantum-amplifier-breakthrough/
-
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver two new malware families dubbed BEARDSHELL and COVENANT.BEARDSHELL, per CERT-UA, is written in C++ and offers the ability to download and execute PowerShell scripts, as…
-
KnowBe4 Studie belegt Diskrepanz zwischen KI-Nutzung und Einhaltung der KI-Regularien
Die Umfrage wurde von Censuswide unter 12.037 Berufstätigen in Deutschland, Südafrika, den Niederlanden, Frankreich, Großbritannien und den USA durchgeführt alle Teilnehmenden nutzen einen Computer bei der Arbeit. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/knowbe4-studie-belegt-diskrepanz-zwischen-ki-nutzung-und-einhaltung-der-ki-regularien/a41185/
-
PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
A recent threat hunting session has revealed a sophisticated PowerShell script, named y1.ps1, hosted in an open directory on a Chinese server (IP: 123.207.215.76). First detected on June 1, 2025, this script operates as a shellcode loader, employing advanced in-memory execution techniques to bypass traditional disk-based detection mechanisms. The discovery, attributed to Shenzhen Tencent Computer…
-
16 Billion Passwords Stolen From 320 Million+ Computers Leaked Online
Tags: apple, breach, computer, credentials, cyber, cybersecurity, data, data-breach, github, google, government, identity, Internet, leak, login, password, risk, serviceA staggering 16 billion login credentials, usernames, and passwords have been exposed in what cybersecurity experts are calling the largest data breach in internet history. The leak, which impacts major platforms including Apple, Facebook, Google, Instagram, Telegram, GitHub, and even government services, has put billions of online accounts at unprecedented risk of account takeover, identity…
-
Post-Quantum World: From Research to Real-World Cryptography
MIT’s Vinod Vaikuntanathan on Post-Quantum Shift, Cryptography’s Role in AI Trust. As the race to build quantum computers intensifies, a parallel transformation is taking place in the field of cryptography. Vinod Vaikuntanathan, professor of computer science at Massachusetts Institute of Technology, believes now is the time to act. First seen on govinfosecurity.com Jump to article:…
-
Foreign aircraft, domestic risks
Tags: access, attack, authentication, best-practice, blueteam, breach, computer, control, cyber, cybersecurity, data, defense, detection, encryption, firmware, framework, government, Hardware, injection, leak, malicious, malware, monitoring, network, nist, phone, risk, software, supply-chain, technology, threat, update, vulnerabilityCondensed threat matrix Legacy protocols create new attack surfaces : One of the banes of the OT world is the reliance on legacy technology that cannot easily be patched or upgraded without causing major disruptions. Similarly, the Boeing 747-8 employs a hybrid bus architecture. While it integrates modern flight management technologies like the Thales TopFlight Flight…
-
Operation 999: Ransomware tabletop tests cyber execs’ response
Tags: access, attack, blueteam, breach, computer, conference, cyber, cyberattack, cybersecurity, data, data-breach, extortion, group, hacker, incident, incident response, infrastructure, leak, military, network, ransom, ransomware, RedTeam, resilience, risk, service, threat, tool, trainingExtortion attempts rebuffed: As the exercise moved on, the blue team refuse to pay a ransom after consulting with the authorities, legal teams, and crisis management experts. Instead of upping the ante by threatening to sabotage the water treatment algorithms or chemical pumps, potentially tainting the supply, the attackers decide to leak customer records online…
-
GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
A former intern at the UK’s intelligence agency GCHQ has been sentenced to seven and a half years in prison after admitting to smuggling top secret data out of a secure facility using his mobile phone, in a breach described by prosecutors as a “flagrant violation” of national security protocols. Hasaan Arshad, 25, a computer…

