Akira
You must login to view this content
You must login to view this content
You must login to view this content
A sophisticated malware campaign targeting Ivanti Connect Secure VPN devices has been actively exploiting critical vulnerabilities CVE-2025-0282 and CVE-2025-22457 since December 2024. The ongoing attacks demonstrate advanced persistent threat techniques, deploying multiple malware families including MDifyLoader, Cobalt Strike Beacon, vshell, and Fscan to establish long-term access to compromised networks. The attack begins with threat actors […]
The post Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon appeared first on Cyber Security News.
Three critical vulnerabilities in the Sophos Intercept X for Windows product family could allow local attackers to achieve arbitrary code execution with system-level privileges. Identified as CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, the flaws span registry permission misconfigurations, a weakness in the Device Encryption component, and an issue in the Windows installer running under the SYSTEM account. […]
The post Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution appeared first on Cyber Security News.
Researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered an ongoing quishing campaign dubbed “Scanception,” which exploits QR code-based delivery mechanisms to distribute credential-harvesting URLs. This advanced phishing operation begins with targeted emails containing PDF lures that mimic legitimate enterprise communications, urging recipients to scan embedded QR codes. By shifting the attack surface to […]
The post New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Police disrupt ransomware and DDoS attackers, Katz Stealer expands multi-stage infection campaign, and DPRK-actors spread npm malware.
The post The Good, the Bad and the Ugly in Cybersecurity – Week 29 appeared first on SentinelOne.
Check out why AI security tools are turning into “must have” assets for cyber teams. Plus, get the details on the NCSC’s efforts to supercharge its bug hunting capabilities. Meanwhile, Tenable webinar attendees shared their experience securing machine identities. And get the latest on the crypto crime explosion and on open-source developers’ compliance with the EU’s CRA law.
Here are five things you need to know for the week ending July 18.
1 - Survey: AI security tools becoming standard issueAI security products are no longer in the “nice to have” category, and are instead becoming a staple of cybersecurity teams’ tool suites.
That’s a key finding from a survey of almost 440 cybersecurity pros conducted by the International Information System Security Certification Consortium (ISC2), which published the results this week. ISC2 looked at not just the adoption of AI security tools but also at how they are transforming teams, entry-level jobs and training.
“AI is reshaping how organizations operate, and cybersecurity is no exception," ISC2 Chief Qualifications Officer Casey Marks said in a statement. "Our latest AI Survey shows cautious but growing interest in AI security tools, with adoption expected to accelerate in the future.”
Specifically, ISC2 found that 30% of respondents are already using AI security tools, while 42% are either evaluating or actively testing them. Only 10% of respondents said they have no plans to adopt AI security tools.
What’s driving this trend? Concrete benefits. Among teams who are using AI security tools, 70% credit these new wares with improving their cyber operations.
“AI-based security tools have the potential to enhance cybersecurity capabilities, increase efficiency and reduce human error, while increasing the ability to address the growing scale and sophistication of modern threats,” reads the “2025 AI Adoption Pulse Survey” from ISC2, which is a large non-profit organization that offers cybersecurity training and certifications.
The cybersecurity areas in which respondents see AI having the greatest impact are network monitoring and intrusion detection; endpoint protection and response; and vulnerability management. Why? AI is particularly good at crunching large data sets quickly, generating insights in real time, automating repetitive tasks, and accelerating detection and responses.
However, AI use raises questions about the future of cyber roles. Over half (52%) of respondents say AI could decimate entry-level staff jobs as it takes over the repetitive, time-consuming tasks typically assigned to junior members of the team. If this happens, it could result in a significant skills gap, since less experienced cyber pros eventually grow their skills and knowledge, and take on more complex roles.
Still, 31% of respondents see a potential upside: Instead of reducing the hiring of entry-level staffers, organizations could instead assign them to areas such as AI governance, automation and security data analysis. And there’s evidence of this shift. ISC2 reports that it has seen entry-level cyber jobs advertised for AI-assisted SOC analyst; AI governance / compliance associate; and cloud security support analyst.
For more information about the uses of AI-boosted cybersecurity tools:
In a move aimed at strengthening the U.K.’s ability to discover and tackle software bugs, the country’s cybersecurity agency has launched a new project called the Vulnerability Research Initiative (VRI).
Specifically, the VRI’s main charter will be to boost the collaboration between the vulnerability research team at the U.K. National Cyber Security Centre (NCSC) and external partners, such as other U.K. government agencies, technology companies and others.
“The VRI’s mission is to strengthen the U.K.’s ability to carry out VR. We work with the best external vulnerability researchers to deliver deep understanding of security on a wide range of the technologies we care about,” reads an NCSC statement.
The VRI will focus on partnering with external researchers to deepen the NCSC’s understanding of:
A core team consisting of technical experts, relationship managers and project managers will manage the VRI and be responsible for communicating research requirements to industry partners and monitoring the progress and outcomes of research efforts.
“As well as informing our advice and guidance as the National Technical Authority on cyber security, our research allows us to engage with technology vendors to encourage them to fix the bugs we find and build more secure products,” the statement reads.
The NCSC is also looking to the future, with plans to extend its engagement on specific topics, including the application of artificial intelligence to vulnerability research. Researchers and organizations interested in participating in the VRI can contact the NCSC for more information.
For recent research and analysis of software vulnerabilities, check out these Tenable blogs:
During our recent webinar “Rage Against the Machines: How to Protect Your Org's Machine Identities,” we polled attendees on their challenges securing non-human identities. Check out what they said.
(58 webinar attendees polled by Tenable, July 2025)
(61 webinar attendees polled by Tenable, July 2025)
To get more details about mitigating machine identity risk, watch this webinar on demand.
4 - Open source devs get guidance for CRA complianceDevelopers of open source software (OSS) who want to learn more about staying compliant with the EU’s Cyber Resilience Act (CRA) now have a new resource to check out.
The Open Source Security Foundation (OpenSSF) this week published its “CRA Brief Guide for OSS Developers,” which it describes as a document meant to help OSS developers better grasp this new law’s scope and key concepts.
“If you develop OSS, we think you’ll appreciate this straightforward guide,” David A. Wheeler, Director of Open Source Supply Chain Security at OpenSSF, wrote in a blog.
“It is not legal advice; rather, it is an overview to help you understand the situation — but understanding is the first step,” he added.
Here are some high-level takeaways from the OpenSSF guide:
The CRA, which was adopted in October 2024, will begin to apply in December 2027, although some of its provisions will become enforceable earlier. It applies to makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices.
The CRA outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including that they:
For more information and analysis about the EU’s Cyber Resilience Act:
VIDEO
The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation)
5 - Report: Crypto theft balloons in 2025’s first halfCyber thieves are doubling down on cryptocurrency targets, having already exceeded 2024’s crypto thefts. So says blockchain analysis firm Chainalysis, which this week reported that a staggering $2.17 billion was stolen from crypto services in the first six months of 2025.
The dramatic surge in crypto crime has been driven by massive breaches, including the $1.5 billion theft from ByBit attributed to North Korean cyber actors – the largest crypto hack ever. If the pace of crypto theft holds, total stolen funds could top $4 billion by year's end.
(Source: Chainalysis’ “2025 Crypto Crime Mid-year Update” report, July 2025)
Key findings include:
“The surge in cryptocurrency thefts represents both an immediate threat to ecosystem participants and a long-term challenge for the industry’s security infrastructure,” reads Chainalysis’ “2025 Crypto Crime Mid-year Update: Stolen Funds Surge as DPRK Sets New Records” report.
To prevent and mitigate crypto crime, Chainalysis recommendations for service providers and individual users include:
“Thus far, 2025 data present a sobering picture of how crypto crime is evolving. While the ecosystem has matured in terms of regulatory frameworks and institutional security practices, threat actors have correspondingly upgraded their capabilities and expanded their range of targets,” Chainalysis wrote.
“The industry’s response in the coming months will likely determine whether crypto crime continues its concerning trajectory or begins to plateau as defensive measures mature,” it added.
For more information about crypto cyber crime:
Sophos has disclosed three critical security vulnerabilities in its Intercept X for Windows endpoint security solution that could allow attackers to execute arbitrary code and gain system-level privileges on affected systems. The vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, all carry high severity ratings and affect different components of the security software including the updater, Device […]
The post Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025
The post Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks appeared first on Security Boulevard.