Skip to content
Blogs

Blogs

Akira Targets SonicWall VPNs in Zero-Day Surge

Akira Targets SonicWall VPNs in Zero-Day Surge

In late July 2025, Arctic Wolf identified a surge in ransomware intrusions linked to SonicWall SSL VPNs, with evidence suggesting the exploitation of a likely zero-day vulnerability. Several incidents involved compromised VPN access despite devices being fully patched and protected with TOTP-based MFA. In many cases, accounts were breached shortly after credential rotations, pointing to…

Read More “Akira Targets SonicWall VPNs in Zero-Day Surge” »

Security
Akira Targets SonicWall VPNs in Zero-Day Surge

Akira Targets SonicWall VPNs in Zero-Day Surge

On July 29, 2025, Cursor, a widely used AI-powered code editor, released version 1.3 to patch a critical remote code execution (RCE) vulnerability tracked as CVE-2025–54135 (CVSS 8.6). Discovered by Aim Security, the flaw dubbed “CurXecute”, allowed attackers to exploit Cursor’s integration with external Model Control Protocol (MCP) servers to execute arbitrary code. The issue…

Read More “Akira Targets SonicWall VPNs in Zero-Day Surge” »

Security
Hacktivists Disrupt Russia’s Aeroflot Airline

Hacktivists Disrupt Russia’s Aeroflot Airline

On July 29, Russian airline Aeroflot announced that it had stabilized flight operations after a major cyberattack disrupted its IT infrastructure the day before. While Aeroflot described the disruption as a “technical failure,” prosecutors are investigating it as a cyberattack. Two pro-Ukraine hacking groups, Belarusian Cyber Partisans and the newly emerged Silent Crow, claimed responsibility….

Read More “Hacktivists Disrupt Russia’s Aeroflot Airline” »

Hacker
Tea App Breach Leaks Sensitive User Data

Tea App Breach Leaks Sensitive User Data

Tea, a popular app that allows women to anonymously share information about potential matches, including criminal background checks and reverse image searches, suffered a major data breach in late July. Sensitive data such as driver’s licenses, private messages, selfies, and metadata revealing users’ locations was leaked online, reportedly through 4chan. The breach impacted users who…

Read More “Tea App Breach Leaks Sensitive User Data” »

Data Privacy
AI-Generated npm Package Steals Solana Wallets

AI-Generated npm Package Steals Solana Wallets

On July 28, 2025, a malicious npm package named @kodane/patch-manager was flagged by cybersecurity researchers for deploying a cryptocurrency wallet drainer and likely generated using AI. Disguised as a utility for license validation and registry optimization in Node.js apps, the package was downloaded over 1,500 times before being removed from the npm registry. Security firm…

Read More “AI-Generated npm Package Steals Solana Wallets” »

Ai
Telecom Giant Orange Files Complaint After Cyber Incident

Telecom Giant Orange Files Complaint After Cyber Incident

On Friday, 25 July, Orange Group detected a cyberattack targeting one of its internal information systems.Upon discovery, Orange’s response teams working closely with Orange Cyberdefense, immediately activated containment protocols. To limit the impact, several systems were isolated, which led to temporary disruptions affecting certain management services and platforms. The impact was primarily observed among Business…

Read More “Telecom Giant Orange Files Complaint After Cyber Incident” »

Cyber
ERP Next Implementation: A Powerful Alternative to SAP, NetSuite, Oracle, and Dynamics 365

ERP Next Implementation: A Powerful Alternative to SAP, NetSuite, Oracle, and Dynamics 365

Are you searching for an agile, cost-effective, and scalable ERP solution that rivals the giants like SAP, NetSuite, Oracle, and Microsoft Dynamics 365? Meet ERPNext — the open-source ERP platform that is redefining how modern businesses run their operations. What is ERPNext? ERPNext is a robust, cloud-native Enterprise Resource Planning (ERP) software that helps businesses…

Read More “ERP Next Implementation: A Powerful Alternative to SAP, NetSuite, Oracle, and Dynamics 365” »

ERP Next
Is Your Hospital Truly Secure? HHS OIG Audit Reveals Startling Gaps

Is Your Hospital Truly Secure? HHS OIG Audit Reveals Startling Gaps

In a striking revelation, the U.S. Department of Health and Human Services Office of Inspector General (HHS OIG) has uncovered major cybersecurity shortcomings at a prominent Northeastern hospital during a recent HIPAA audit. The findings serve as a wake-up call not just to one institution but to the entire healthcare ecosystem. What Was the Issue? This unnamed…

Read More “Is Your Hospital Truly Secure? HHS OIG Audit Reveals Startling Gaps” »

Cyber
Cloud Malware Spreads Cryptominers

Cloud Malware Spreads Cryptominers

Soco404 and Koske exploit configs with fake pages, mining on global cloud systemsJuly 2025 Security researchers have uncovered two separate malware campaigns — Soco404 and Koske — that exploit vulnerabilities and misconfigurations in cloud environments to install cryptocurrency miners on both Linux and Windows systems. Soco404 Campaign Attributed to threat actors tracked by Wiz, Soco404…

Read More “Cloud Malware Spreads Cryptominers” »

Cyber
India-Linked Group Targets Turkish Defense

India-Linked Group Targets Turkish Defense

Patchwork uses fake invites with LNK files to breach missile contractors for intel28 July 2025 The Indian-linked threat actor Patchwork (also known as APT-C-09, Dropping Elephant, Operation Hangover) has launched a spear-phishing campaign against Turkish defense contractors, aiming to collect sensitive intelligence on unmanned vehicle systems and missile programs. Geopolitical Context The timing aligns with…

Read More “India-Linked Group Targets Turkish Defense” »

Security

Posts pagination

Previous 1 2 3 4 … 10 Next

Categories

  • Ai
  • Captcha
  • Common
  • Cyber
  • Data Privacy
  • ERP Next
  • Hacker
  • Healthcare
  • Hitrust
  • IT
  • RBI
  • Security
  • SOC
  • Uncategorized

Copyright © 2026 Blogs.

Powered by PressBook Masonry Blogs