Google to Verify Android Developers in Select Countries to Prevent Malicious Apps

Google has revealed plans to implement a verification system for all developers distributing Android apps, including those offering apps outside the Play Store. “Going forward, apps on certified Android devices must be published by verified developers,” the company stated. “This step ensures accountability and makes it much harder for attackers to quickly release harmful apps … Continued

U.S. Sanctions Russian Crypto Exchange Garantex and Successor Grinex, Offers $6 Million Reward for Key Leaders

The U.S. Departments of State and Treasury have jointly intensified their crackdown on illicit cryptocurrency networks by targeting Garantex, a Russian-operated exchange accused of serving as a major hub for money laundering by cybercriminals and organized crime groups. Through the Transnational Organized Crime Rewards Program (TOCRP), the U.S. State Department has announced rewards totaling up … Continued

Cisco Alerts on Critical CVSS 10.0 RADIUS Vulnerability in Secure Firewall Management Center

Cisco has issued urgent patches for a critical vulnerability in its Secure Firewall Management Center (FMC) software, rated the highest possible severity (CVSS score: 10.0). If exploited, the flaw could enable remote attackers to run arbitrary code on vulnerable systems. Tracked as CVE-2025-20265, the issue lies in the RADIUS subsystem of FMC. An unauthenticated attacker … Continued

The Uncertain Future of SIEM in a Rapidly Evolving Security Landscape

Many cybersecurity professionals recognize that the Security Information and Event Management (SIEM) space is undergoing major transformation — but opinions differ on where it’s headed. About 40% believe SIEM capabilities should be integrated into broader platforms like Extended Detection and Response (XDR) or Endpoint Detection and Response (EDR). In contrast, 35% still see value in … Continued

Kali Linux Now Supported in Apple’s New Container System on macOS Sequoia

Security experts and ethical hackers can now run Kali Linux inside a virtualized container on macOS Sequoia, thanks to Apple’s newly introduced containerization technology. Unveiled at WWDC 2025, Apple’s new framework allows users with Apple Silicon Macs to run isolated Linux distributions in a virtual environment—similar in concept to Microsoft’s WSL2 on Windows. To use … Continued

WordPress Theme Vulnerability Under Active Exploitation, Allowing Full Site Takeovers

A severe security flaw in the popular Alone – Charity Multipurpose Non-profit WordPress Theme is currently being exploited by malicious actors to compromise WordPress sites through unauthorized plugin installations. Identified as CVE-2025-5394 and rated 9.8 on the CVSS scale, the flaw was discovered by security researcher Thái An. It impacts all theme versions up to … Continued

Tea App Breach Deepens: Over a Million Private Messages Also Exposed

The security breach affecting Tea — a women-focused dating safety app — has taken a more alarming turn. New findings reveal a second data leak, this time involving a separate database reportedly holding 1.1 million private conversations between users. Tea was designed to help women share reviews about men in a protected digital space, requiring … Continued

Aeroflot Hit by Major Cyberattack, Hackers Claim Responsibility

Incident: On July 28, 2025, Russia’s flag carrier Aeroflot reported a critical failure in its corporate IT systems, leading to the cancellation of over 40 flights at Moscow’s Sheremetyevo airport—affecting routes to Minsk, Yerevan, Kaliningrad, Grozny, Astrakhan and others MarketScreener+4The Kyiv Independent+4The Edge Malaysia+4. Claims: A hacking group named Silent Crow, in collaboration with Belarusian activists … Continued

Malicious PyPI Package Targets macOS Devs with Hidden Malware

A dangerous Python package was recently found on the official Python Package Index (PyPI). It was named chimera-sandbox-extensions and disguised itself as a helpful tool for Chimera Sandbox, a legitimate open-source project used by developers to run AI experiments, especially on macOS. But in reality, this package was malware designed to steal sensitive information from … Continued

Ransomware Gang Uses SimpleHelp to Hack Utility Billing Firm

A ransomware group has targeted a utility billing software provider by taking advantage of a serious vulnerability in a remote monitoring tool called SimpleHelp. This tool is widely used by managed service providers (MSPs) and IT support teams to access systems remotely. Unfortunately, attackers have found a way to abuse it to launch ransomware attacks. … Continued

Newsletter line