Skip to content
Blogs

Blogs

State Actor Spies on Asian Telecoms

State Actor Spies on Asian Telecoms

Between February and November 2024, state-sponsored threat actor CL-STA-0969 linked to China-based espionage group Liminal Panda targeted telecommunications infrastructure in Southeast Asia to establish persistent access and conduct network surveillance. According to Palo Alto Networks’ Unit 42, attackers employed a range of custom implants and evasive techniques without evidence of data exfiltration. Key tools used…

Read More “State Actor Spies on Asian Telecoms” »

Cyber
Fake OAuth Apps Fuel MFA Phishing

Fake OAuth Apps Fuel MFA Phishing

In 2025, Proofpoint identified an ongoing phishing campaign abusing Microsoft OAuth applications to compromise Microsoft 365 accounts. Threat actors created malicious OAuth apps impersonating trusted services like Adobe, SharePoint, and DocuSign, using them as lures to redirect victims to attacker-in-the-middle (AiTM) phishing sites. These sites, powered by the Tycoon Phishing-as-a-Service platform, captured credentials and session…

Read More “Fake OAuth Apps Fuel MFA Phishing” »

Cyber
St. Paul Deploys National Guard Amid Attack

St. Paul Deploys National Guard Amid Attack

On July 28, 2025, the City of St. Paul, Minnesota, shut down its government IT systems in response to a cyberattack detected three days earlier. The attack targeted critical infrastructure, prompting city officials to take key systems offline to prevent further damage. While 911 and emergency services remained operational, internet-based services at City Hall, libraries,…

Read More “St. Paul Deploys National Guard Amid Attack” »

Cyber
Stealthy ‘Plague’ Backdoor Hits Linux Systems

Stealthy ‘Plague’ Backdoor Hits Linux Systems

In late July 2025, threat hunters uncovered a stealthy Linux backdoor dubbed Plague, implemented as a malicious PAM (Pluggable Authentication Module). The implant enables silent bypass of authentication, persistent SSH access, and leaves minimal forensic traces, making it extremely difficult to detect. Plague has been in circulation since at least mid-2024, with multiple compiled variants…

Read More “Stealthy ‘Plague’ Backdoor Hits Linux Systems” »

Cyber
Akira Targets SonicWall VPNs in Zero-Day Surge

Akira Targets SonicWall VPNs in Zero-Day Surge

In late July 2025, Arctic Wolf identified a surge in ransomware intrusions linked to SonicWall SSL VPNs, with evidence suggesting the exploitation of a likely zero-day vulnerability. Several incidents involved compromised VPN access despite devices being fully patched and protected with TOTP-based MFA. In many cases, accounts were breached shortly after credential rotations, pointing to…

Read More “Akira Targets SonicWall VPNs in Zero-Day Surge” »

Cyber
Akira Targets SonicWall VPNs in Zero-Day Surge

Akira Targets SonicWall VPNs in Zero-Day Surge

On July 29, 2025, Cursor, a widely used AI-powered code editor, released version 1.3 to patch a critical remote code execution (RCE) vulnerability tracked as CVE-2025–54135 (CVSS 8.6). Discovered by Aim Security, the flaw dubbed “CurXecute”, allowed attackers to exploit Cursor’s integration with external Model Control Protocol (MCP) servers to execute arbitrary code. The issue…

Read More “Akira Targets SonicWall VPNs in Zero-Day Surge” »

Cyber
Hacktivists Disrupt Russia’s Aeroflot Airline

Hacktivists Disrupt Russia’s Aeroflot Airline

On July 29, Russian airline Aeroflot announced that it had stabilized flight operations after a major cyberattack disrupted its IT infrastructure the day before. While Aeroflot described the disruption as a “technical failure,” prosecutors are investigating it as a cyberattack. Two pro-Ukraine hacking groups, Belarusian Cyber Partisans and the newly emerged Silent Crow, claimed responsibility….

Read More “Hacktivists Disrupt Russia’s Aeroflot Airline” »

Cyber
Tea App Breach Leaks Sensitive User Data

Tea App Breach Leaks Sensitive User Data

Tea, a popular app that allows women to anonymously share information about potential matches, including criminal background checks and reverse image searches, suffered a major data breach in late July. Sensitive data such as driver’s licenses, private messages, selfies, and metadata revealing users’ locations was leaked online, reportedly through 4chan. The breach impacted users who…

Read More “Tea App Breach Leaks Sensitive User Data” »

Data Sciences
AI-Generated npm Package Steals Solana Wallets

AI-Generated npm Package Steals Solana Wallets

On July 28, 2025, a malicious npm package named @kodane/patch-manager was flagged by cybersecurity researchers for deploying a cryptocurrency wallet drainer and likely generated using AI. Disguised as a utility for license validation and registry optimization in Node.js apps, the package was downloaded over 1,500 times before being removed from the npm registry. Security firm…

Read More “AI-Generated npm Package Steals Solana Wallets” »

Ai
Telecom Giant Orange Files Complaint After Cyber Incident

Telecom Giant Orange Files Complaint After Cyber Incident

On Friday, 25 July, Orange Group detected a cyberattack targeting one of its internal information systems.Upon discovery, Orange’s response teams working closely with Orange Cyberdefense, immediately activated containment protocols. To limit the impact, several systems were isolated, which led to temporary disruptions affecting certain management services and platforms. The impact was primarily observed among Business…

Read More “Telecom Giant Orange Files Complaint After Cyber Incident” »

Cyber

Posts pagination

Previous 1 … 4 5 6 … 12 Next

Categories

  • Ai
  • Cyber
  • Data Sciences
  • ERPNext
  • Technology

Copyright © 2026 Blogs.

Powered by PressBook Masonry Blogs