Latest news

RedMike (Salt Typhoon) continues global Telecom attacks
Spyware

RedMike (Salt Typhoon) continues global Telecom attacks

14 February 2025 securebulletin.com

Despite widespread awareness and U.S. sanctions, the Chinese state-sponsored threat group RedMike (also known as Salt Typhoon) remains a persistent...
Students are suing to stop access to sensitive financial aid databases by Department of Government Efficiency members
Business

Students are suing to stop access to sensitive financial aid databases by Department of Government Efficiency members

8 February 2025 securebulletin.com

A recent lawsuit filed by the University of California Student Association against the U.S. Department of Education highlights significant cybersecurity...
LLMjacking: the exploitation of API keys in DeepSeek and beyond
AI

LLMjacking: the exploitation of API keys in DeepSeek and beyond

8 February 2025 securebulletin.com

The rise of LLMjacking, a sophisticated cyberattack targeting large language models (LLMs), has sparked growing concerns among enterprises relying on...
Canadian national faces charges in $65M crypto-hacking spree
Cybercrime

Canadian national faces charges in $65M crypto-hacking spree

8 February 2025 securebulletin.com

A Canadian man is facing charges related to a series of cryptocurrency hacks that siphoned off an estimated $65 million,...
The rising threat of ADFS spoofing attacks
Vulnerability

The rising threat of ADFS spoofing attacks

5 February 2025 securebulletin.com

In a recent alarming development, hackers have launched a sophisticated phishing campaign targeting Microsoft Active Directory Federation Services (ADFS) to...
Silent Lynx: a new threat actor in central Asia’s cyber landscape
Phishing

Silent Lynx: a new threat actor in central Asia’s cyber landscape

5 February 2025 securebulletin.com

In recent weeks, cybersecurity experts have identified a previously undocumented threat actor known as Silent Lynx, which has been linked...
Critical vulnerabilities in Netgear routers demand immediate attention
Vulnerability

Critical vulnerabilities in Netgear routers demand immediate attention

4 February 2025 securebulletin.com

On February 4, 2025, Netgear issued a crucial alert regarding two significant vulnerabilities impacting several of its WiFi router models....
Grubhub confirmed data breach from unauthorized access to third-party service provider
Databreach

Grubhub confirmed data breach from unauthorized access to third-party service provider

4 February 2025 securebulletin.com

In a recent cybersecurity incident, Grubhub revealed that hackers accessed sensitive personal data from customers through a breach involving a...
A critical race condition vulnerability (CVE-2025-24118) in Apple’s macOS kernel has been discovered
Vulnerability

A critical race condition vulnerability (CVE-2025-24118) in Apple’s macOS kernel has been discovered

3 February 2025 securebulletin.com

A critical vulnerability has been identified in the macOS kernel (XNU), designated as CVE-2025-24118, which poses significant risks for users...
Malicious scripts on the CASIO e-shop stole credit card and personal customer details
Databreach

Malicious scripts on the CASIO e-shop stole credit card and personal customer details

3 February 2025 securebulletin.com

On February 3, 2025, the Casio UK online store fell victim to a significant cyberattack, leading to the unauthorized access...
Meta’s recent disclosure on ZeroClick WhatsApp spyware campaign
Spyware

Meta’s recent disclosure on ZeroClick WhatsApp spyware campaign

2 February 2025 securebulletin.com

Meta-owned WhatsApp confirmed the disruption of a sophisticated spyware campaign targeting journalists and civil society members. This revelation underscores the...
Operation Marya: Deep Web Konek investigates online child exploitation networks
Cybercrime

Operation Marya: Deep Web Konek investigates online child exploitation networks

2 February 2025 securebulletin.com

The recent investigation known as Operation Marya has shed light on the alarming scale of online child exploitation networks, particularly...