Tag: international
-
Tech provider for NHS England confirms data breach
U.K.-based healthcare tech provider DXS International said it discovered and contained a data breach on Sunday. A ransomware gang took credit for the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2025/12/18/tech-provider-for-nhs-england-confirms-data-breach/
-
FBI Seizes Crypto Laundering Hub E-Note Linked to Russian Admin
The FBI and international police have shut down E-Note, a cryptocurrency exchange that laundered over $70 million for cybercriminals. Read about the indictment of a Russian and how the global task force ended his decade-long operation. First seen on hackread.com Jump to article: hackread.com/fbi-seize-e-note-crypto-laundering-russian-admin/
-
CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited
Tags: access, advisory, attack, authentication, control, cve, cyber, data, exploit, firewall, flaw, injection, international, mobile, ransomware, sql, vulnerability, zero-dayA zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild in a chained attack with CVE-2025-23006. Key takeaways: CVE-2025-40602 is a local privilege escalation vulnerability in the appliance management console (AMC) of the SonicWall SMA 1000 appliance. CVE-2025-40602 has been exploited in a chained attack with CVE-2025-23006, a deserialization…
-
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola shares how her unconventional path led her to global cyber threat analysis and highlights the power of diverse backgrounds on an international team First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/lexi-discolas-guide-to-global-teamwork-and-overflowing-tbrs/
-
The Burnout Nobody Talks About: When “Always-On” Leadership Becomes a Liability
Tags: business, cybersecurity, data, incident response, international, resilience, risk, risk-management, skills, threatIn cybersecurity, being “always on” is often treated like a badge of honor. We celebrate the leaders who respond at all hours, who jump into every incident, who never seem to unplug. Availability gets confused with commitment. Urgency gets mistaken for effectiveness. And somewhere along the way, exhaustion becomes normalized”, if not quietly admired. But…
-
No more orange juice? Why one ship reveals America’s maritime cybersecurity crisis
This is a workforce problem, not a vendor problem: The new regulations require all 3,000 MTSA facilities to designate a cybersecurity officer (why the Coast Guard named them CySOs and couldn’t just call them CISOs, I do not know). Finding hundreds of qualified people who understand both operational technology in maritime environments and cybersecurity is…
-
No more orange juice? Why one ship reveals America’s maritime cybersecurity crisis
This is a workforce problem, not a vendor problem: The new regulations require all 3,000 MTSA facilities to designate a cybersecurity officer (why the Coast Guard named them CySOs and couldn’t just call them CISOs, I do not know). Finding hundreds of qualified people who understand both operational technology in maritime environments and cybersecurity is…
-
Cybersecurity leaders’ top seven takeaways from 2025
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, control, cyber, cybersecurity, data, data-breach, deep-fake, defense, detection, email, exploit, framework, governance, government, grc, identity, international, malicious, network, nist, phishing, regulation, resilience, risk, saas, service, software, strategy, supply-chain, technology, threat, tool, vulnerability2. AI forced companies to rethink their security strategies: At the same time, Abousselham notes how the rapid rollout of AI forced companies to shift their resources to keep pace with the change, while maintaining safe product releases. He calls 2025 the “chaotic introduction of agentic AI”.”I don’t think the industry was ready or expected…
-
Cybersecurity leaders’ top seven takeaways from 2025
Tags: access, ai, api, attack, automation, breach, business, ciso, compliance, control, cyber, cybersecurity, data, data-breach, deep-fake, defense, detection, email, exploit, framework, governance, government, grc, identity, international, malicious, network, nist, phishing, regulation, resilience, risk, saas, service, software, strategy, supply-chain, technology, threat, tool, vulnerability2. AI forced companies to rethink their security strategies: At the same time, Abousselham notes how the rapid rollout of AI forced companies to shift their resources to keep pace with the change, while maintaining safe product releases. He calls 2025 the “chaotic introduction of agentic AI”.”I don’t think the industry was ready or expected…
-
Infosecurity.US Wishes All A Happy Hanukkah!
United States of America’s NASA Astronaut Jessica Meir’s Hanukkah Wishes from the International Space Station: Happy Hanukkah to all those who celebrate it on Earth! (Originally Published in 2019) United States of America’s NASA Astronaut Jessica Meir Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/12/infosecurity-us-wishes-all-a-happy-hanukkah/
-
Thailand’s Personal Data Protection Act
What is the Personal Data Protection Act (PDPA) of Thailand? The Personal Data Protection Act, B.E. 2562 (2019), often referred to by its acronym, PDPA, is Thailand’s comprehensive data privacy and protection law. Enacted to safeguard the personal data of individuals, it is heavily influenced by international privacy standards, most notably the European Union’s General……
-
Thailand’s Personal Data Protection Act
What is the Personal Data Protection Act (PDPA) of Thailand? The Personal Data Protection Act, B.E. 2562 (2019), often referred to by its acronym, PDPA, is Thailand’s comprehensive data privacy and protection law. Enacted to safeguard the personal data of individuals, it is heavily influenced by international privacy standards, most notably the European Union’s General……
-
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure
The Cybersecurity and Infrastructure Security Agency (CISA), alongside several other U.S. and international agencies, released an advisory covering the cyberattacks launched by CyberArmyofRussia_Reborn (CARR), NoName057(16) and several related groups. First seen on therecord.media Jump to article: therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure
-
CISA and FBI Warn of Pro-Russia Hacktivist Attacks on Critical Infrastructure Worldwide
Tags: advisory, attack, cisa, cyber, cybercrime, cybersecurity, infrastructure, international, russia, tactics, technologyThe Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and international partners from the European Cybercrime Centre (EC3) have released a joint cybersecurity advisory detailing the escalating activities of pro-Russia hacktivist groups. This new advisory highlights a shift in tactics, with hacktivists targeting Operational Technology (OT) and Industrial…
-
CISA and FBI Warn of Pro-Russia Hacktivist Attacks on Critical Infrastructure Worldwide
Tags: advisory, attack, cisa, cyber, cybercrime, cybersecurity, infrastructure, international, russia, tactics, technologyThe Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and international partners from the European Cybercrime Centre (EC3) have released a joint cybersecurity advisory detailing the escalating activities of pro-Russia hacktivist groups. This new advisory highlights a shift in tactics, with hacktivists targeting Operational Technology (OT) and Industrial…
-
Police Dismantle EUR 700 Million Crypto Scam That Used Deepfakes
Europol and Eurojust led a massive international police operation that successfully dismantled a crypto fraud network that laundered over Euro700M using deepfake ads. First seen on hackread.com Jump to article: hackread.com/police-bust-eur-700m-deepfake-crypto-network/
-
Police Dismantle EUR 700 Million Crypto Scam That Used Deepfakes
Europol and Eurojust led a massive international police operation that successfully dismantled a crypto fraud network that laundered over Euro700M using deepfake ads. First seen on hackread.com Jump to article: hackread.com/police-bust-eur-700m-deepfake-crypto-network/
-
Police Dismantle EUR 700 Million Crypto Scam That Used Deepfakes
Europol and Eurojust led a massive international police operation that successfully dismantled a crypto fraud network that laundered over Euro700M using deepfake ads. First seen on hackread.com Jump to article: hackread.com/police-bust-eur-700m-deepfake-crypto-network/
-
Ermittler kappen Tausende Nummern von mutmaßlichen Betrügern
Mehr als 3.500 von Cyberkriminellen genutzte Rufnummern wurden abgeschaltet.Im Kampf gegen Anlagebetrüger, «Enkeltrick»-Kriminelle und falsche Polizisten ist den Ermittlern nach eigenen Angaben ein großer Schlag gelungen. Die Infrastruktur der mutmaßlichen Cyberkriminellen sei erheblich geschwächt worden, teilten das bei der Generalstaatsanwaltschaft Karlsruhe eingerichtete Cybercrime-Zentrum Baden-Württemberg, das baden-württembergische Landeskriminalamt (LKA) und die Bundesanstalt für Finanzdienstleistungsaufsicht (Bafin) gemeinsam…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 74
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Analysis of ShadowPad Attack Exploiting WSUS Remote Code Execution Vulnerability (CVE-2025-59287) Shai-Hulud 2.0 Supply Chain Attack: 25K+ npm Repos Exposed Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Morphisec Thwarts Russian-Linked…
-
Security Affairs newsletter Round 553 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs Maximum-severity XXE vulnerability discovered in Apache…
-
Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
A human rights lawyer from Pakistan’s Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first time a civil society member in the country was targeted by Intellexa’s Predator spyware, Amnesty International said in a report.The link, the non-profit organization said, is a “Predator attack attempt based on the technical…
-
Anlagebetrüger ködern mit falscher Promi-Werbung
Cyberkriminelle sollen deutschlandweit mindestens 120 Menschen um einen Gesamtbetrag von mehr als 1,3 Millionen Euro gebracht haben.Die Werbung mit Promis für ein “geheimes Finanzprodukt” war gefälscht, Anleger verloren ihr Geld: Mutmaßliche Internet-Kriminelle sollen deutschlandweit mindestens 120 Menschen um einen Gesamtbetrag von mehr als 1,3 Millionen Euro gebracht haben. Die Ermittler gehen aber von einer hohen…
-
New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware provider known for its >>Predator
-
CISA and International Partners Issue Guidance for Secure AI in Infrastructure
Cybersecurity agencies have issued guidance for securely integrating AI into OT systems First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-guidance-secure-ai-ot/
-
DevilsTongue Spyware Targets Windows Users Across Multiple Countries
Researchers at Insikt Group have uncovered new infrastructure linked to multiple operational clusters associated with Israeli spyware vendor Candiru, revealing an ongoing campaign deploying the sophisticated DevilsTongue malware against Windows users across several nations. The discovery highlights the persistent threat posed by commercial surveillance tools despite international regulatory efforts to curb their abuse. The investigation…
-
DevilsTongue Spyware Targets Windows Users Across Multiple Countries
Researchers at Insikt Group have uncovered new infrastructure linked to multiple operational clusters associated with Israeli spyware vendor Candiru, revealing an ongoing campaign deploying the sophisticated DevilsTongue malware against Windows users across several nations. The discovery highlights the persistent threat posed by commercial surveillance tools despite international regulatory efforts to curb their abuse. The investigation…

