New macOS Malware Campaign Uses ClickFix Trick to Target Apple Users

Cybersecurity experts have uncovered a fresh malware campaign targeting macOS users through a social engineering technique known as ClickFix. This operation aims to deceive users into downloading a malicious software called Atomic macOS Stealer (AMOS), designed to steal sensitive information from Apple devices. Researchers at CloudSEK report that the attackers exploit lookalike domains mimicking the … Continued

China Offers Bounties for Alleged Taiwanese Military Hackers, Escalating Cyber Tensions

In a move that has raised eyebrows across the global cybersecurity and geopolitical communities, Chinese authorities have publicly accused members of Taiwan’s military of cyberespionage and are offering financial rewards for their capture. 🔍 Public Accusations and Bounty Announcement On June 5, authorities in Guangzhou, a major city in southern China, announced cash rewards exceeding … Continued

Microsoft Steps Up: Offers Free Cybersecurity Support to European Governments Amid Rising Threats

Microsoft has unveiled a significant initiative to bolster the cybersecurity defenses of European governments at no cost, addressing the escalating threat landscape, particularly from state-sponsored actors leveraging advanced technologies like AI. On June 4, 2025, Microsoft announced a comprehensive program aimed at enhancing intelligence-sharing on AI-based threats and assisting in the prevention and disruption of … Continued

HPE Issues Critical Security Fixes for StoreOnce Backup Systems

Hewlett Packard Enterprise (HPE) has rolled out urgent security patches to fix eight separate vulnerabilities in its StoreOnce data backup and deduplication platform. These flaws, if left unaddressed, could enable attackers to bypass authentication measures and execute remote code on affected systems. According to HPE’s official advisory, the vulnerabilities open the door to various attack … Continued

CrowdStrike and Partners Launch Unified Threat Actor Naming Initiative

In a bold and long-overdue move, Microsoft and CrowdStrike, two of the cybersecurity industry most influential players, have joined forces to revolutionize how cyber threat actors are named and tracked. Partnering with Google’s Mandiant and Palo Alto Networks’ Unit 42, this initiative aims to establish a standardized naming convention for known threat actors—a sort of … Continued

Critical Linux Flaws Expose Password Hashes: What You Need to Know 

Cybersecurity researchers have identified two significant vulnerabilities in widely used Linux distributions, specifically impacting Ubuntu, Red Hat Enterprise Linux (RHEL), and Fedora. A local attacker could use these flaws to steal sensitive information, including user password hashes, which are crucial for system security. To understand these vulnerabilities, one should first understand “Core Dumps”. A core … Continued

U.S. DOJ Disrupts Malware Obfuscation Networks

DOJ Takedown Marks Major Win Against Malware Crypting Services In a multinational law enforcement operation, the U.S. Department of Justice has seized four domains that provided services to cybercriminals, enabling them to evade antivirus detection. Cybercriminals frequently use “malware crypting services” and  “counter-antivirus (CAV) tools” to render their malware undetectable by conventional security systems.   … Continued

U.S. Sanctions Funnull for $200M Romance Scam Linked to Crypto Fraud

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Funnull Technology Inc., a Philippines-based company, along with its administrator Liu Lizhi, for facilitating extensive romance baiting scams that resulted in substantial cryptocurrency losses. Operating out of Taguig, Philippines, Funnull allegedly provided technical support to thousands of fraudulent websites offering fake … Continued

Inside the Recently Disclosed Cisco IOS XE WLC Vulnerability CVE-2025-20188

Recently, Cisco revealed a critical vulnerability CVE-2025-20188 in its IOS XE Wireless Controller Software, affecting version 17.12.03 and earlier. CVE-2025-20188 stems from an unauthenticated arbitrary file upload mechanism, is linked to a hard-coded JSON Web Token (JWT) in the system. This vulnerability impacts Cisco’s widely deployed Wireless LAN Controller (WLC), a core enterprise solution integrated … Continued

Security Flaw Identified in Apache Tomcat CGI Servlet – CVE-2025-46701

The Apache Software Foundation has disclosed a new security vulnerability affecting multiple versions of Apache Tomcat. Tracked as CVE-2025-46701, the issue allows for a security constraint bypass under specific conditions, though it has been classified as a low severity risk. CVE-2025-46701 The flaw impacts Apache Tomcat versions: 11.0.0-M1 to 11.0.6 10.1.0-M1 to 10.1.40 9.0.0.M1 to … Continued

Newsletter line