Meta Disrupted Three Global Influence Campaigns in Q1

In its latest Adversarial Threat Report for Q1 2025, Meta has announced the takedown of three coordinated influence operations originating from Iran, China, and Romania. These campaigns were dismantled before they gained traction among authentic users on Meta’s platforms and beyond. Romanian Election One of the largest networks uncovered during the quarter was linked to … Continued

Dell Issues Critical PowerStore T Security Update

Dell Technologies has rolled out a critical security update for its PowerStore T family of storage appliances, addressing multiple vulnerabilities that could leave systems exposed to exploitation. The update, detailed in Security Advisory DSA-2025-223, is rated as high impact and is strongly recommended for all users to apply without delay. What’s at Stake? This update … Continued

LexisNexis Breach Exposes Personal Data of Over 364,000 Individuals

In a significant data security incident, LexisNexis Risk Solutions, a major U.S.-based data analytics company, has confirmed a breach that compromised the personal information of more than 300,000 individuals. The breach originated in December 2024 but only came to light in April 2025, when LexisNexis was notified that a threat actor had stolen company data … Continued

Critical Flaw in Microsoft OneDrive File Picker Exposing Millions of Users Data

Security researchers at Oasis Security have uncovered a significant vulnerability in Microsoft’s OneDrive File Picker, revealing that websites using the tool can gain access to a user’s entire OneDrive storage not just the specific files intended for upload. This flaw, which affects hundreds of apps including ChatGPT, Slack, Trello, and ClickUp, could impact millions of … Continued

Thousands of ASUS Routers Compromised Silently

GreyNoise has discovered a sophisticated campaign exploiting ASUS routers exposed to the internet,using CVE-2023-39780 (command injection vulnerability). This operation is not just a one-off attack, but part of a broader effort to construct a distributed network of compromised devices, likely intended for future botnet operations. The attackers behind this campaign are not your average opportunists. … Continued

DragonForce Ransomware Hits MSP via RMM Exploit

Sophos recently uncovered a targeted cyberattack on a Managed Service Provider (MSP) after detecting suspicious activity involving the MSP’s remote monitoring and management (RMM) tool SimpleHelp. The investigation revealed that a threat actor had compromised the RMM platform and used it to deploy DragonForce ransomware across multiple customer environments, exfiltrate sensitive data, and launch a … Continued

Adidas Confirms Customer Data Breach via Third-Party Service Provider

In a statement published on its official website, Adidas has confirmed a data breach involving customer information accessed by an “unauthorised external party.” The sportswear giant clarified that the incident occurred not within its own systems, but through a third-party customer service provider. According to Adidas, the exposed information may include: Full names Email addresses … Continued

Microsoft Issues Emergency Patch for Windows Server 2022 Hyper-V Freezing Bug Impacting Azure Confidential VMs

Microsoft has released an out-of-band (OOB) emergency update to address a critical issue causing some Hyper-V virtual machines (VMs) running on Windows Server 2022 to freeze or restart unexpectedly. The problem primarily affects Azure Confidential VMs, a specialized class of virtual machines designed to secure data during processing, transmission, and storage. The issue stems from … Continued

How a Public Issue Can Breach GitHub Private Repos

Invariant has discovered a critical vulnerability in GitHub’s Model-Centric Programming (MCP) integration—one that allows attackers to hijack AI agents using a malicious GitHub issue and leak sensitive data from private repositories. This vulnerability demonstrates a growing concern in the intersection of AI agents and developer workflows: indirect prompt injection, or what invariant calls them toxic … Continued

npm Malware Map Developer Networks for Supply Chain Attack

Socket’s Threat Research Team has identified a coordinated and ongoing malicious campaign targeting the npm ecosystem, involving at least 60 packages designed to quietly exfiltrate sensitive system information to a threat actor-controlled Discord webhook. What Does it Do? The malicious packages  published under three separate npm accounts deploy post-install scripts that activate during npm install … Continued

Newsletter line