Qilin Ransomware Dominates July with Over 70 Claimed Victims

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

The Qilin ransomware group has solidified its position as the most active threat actor in July 2025, marking its third top ranking in four months following the downturn of former leader RansomHub. According to cybersecurity intelligence from Cyble, Qilin claimed responsibility for 73 victims on its data leak site (DLS), representing approximately 17% of the … Ler mais

Microsoft fixes Windows Server bug causing cluster, VM issues

Picus Blue Report 2025

Microsoft has resolved a known issue that triggers Cluster service and VM restart issues after installing July’s Windows Server 2019 security updates. The company acknowledged the bug in a private advisory seen by BleepingComputer three weeks ago and asked businesses to reach out for support to mitigate the cluster issues. As Redmond explained at the … Ler mais

Booking.com phishing campaign uses sneaky 'ん' character to trick you

Intuit phishing email on desktop

Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new campaign distributing malware. The attack makes use of theJapanesehiragana character,ん, which can, on some systems, appear as a forward slash and make a phishing URL appear realistic to a person at a casual glance. BleepingComputer has … Ler mais

When Theft Replaces Encryption: Blue Report 2025 on Ransomware & Infostealers

Blue Book ransomware threats

Ransomware and infostealer threats are evolving faster than most organizations can adapt. While security teams have invested heavily in ransomware resilience, particularly through backup and recovery systems, Picus Security’s Blue Report 2025 shows that today’s most damaging attacks aren’t always about encryption. Instead, both ransomware operators and infostealer campaigns often focus on credential theft, data … Ler mais

FBI Shares Tips to Spot Fake Lawyer Schemes

FBI Shares Tips to Spot Fake Lawyer Schemes

The FBI has updated its alert about fake lawyers defrauding victims of cryptocurrency scams, adding due diligence measures to help victims. The FBI’s Internet Crime Complaint Center (IC3) has previously warned that fraudsters were posing as lawyers from fictitious law firms and using social media and messaging services to defraud victims of cryptocurrency scams. In … Ler mais

Canada’s House of Commons investigating data breach after cyberattack

Picus Blue Report 2025

The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament of Canada has yet to issue a public statement regarding this incident, CBC News reports that House of Commons staff were notified of … Ler mais

Hacked Law Enforcement and Government Email Accounts Sold on Dark Web

Hacked Law Enforcement and Government Email Accounts Sold on Dark Web

Cybercriminals are selling access to active law enforcement and government email accounts for as little as $40 on the dark web, according to an investigation by Abnormal AI. These compromised accounts belong to officials from the US, UK, India, Brazil and Germany, with agencies such as the FBI among those affected. The ability to impersonate … Ler mais

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with eight other national cyber agencies, has released a comprehensive “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators.” Published on August 13, 2025, this new guide equips critical infrastructure stakeholders—spanning energy, water and wastewater, manufacturing, and beyond—with best practices for developing and maintaining … Ler mais

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft has disclosed a critical security vulnerability in its Internet Information Services (IIS) Web Deploy tool that could allow attackers to execute arbitrary code remotely on affected systems. The vulnerability, designated as CVE-2025-53772, was announced on August 12, 2025, and carries an “Important” severity rating with a CVSS score of 8.8 out of 10. Vulnerability … Ler mais

LLM Coding Integrity Breach – Schneier on Security

Here’s an interesting story about a failure being introduced by LLM-written code. Specifically, the LLM was doing some code refactoring, and when it moved a chunk of code from one file to another it changed a “break” to a “continue.” That turned an error logging statement into an infinite loop, which crashed the system. This … Ler mais