Cybersecurity

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages 

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages 

Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks.
“As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open Source Security

CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF 

CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are listed below –

CVE-2025-2775 (CVSS score: 9.3) – An improper restriction of XML external entity (XXE) reference vulnerability in the

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks 

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025.
“CISA is

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups 

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups 

Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports.
The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as well to obtain initial access to

The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you 

The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you 

In episode 60 of The AI Fix, we learn why Grok might be Elon Musk’s bid for digital immortality, how Meta is building a Manhattan-sized data centre called Prometheus, how AI is helping create carbon-sucking concrete, and are bewildered that 2000 people “work” at the Candy Crush company.

Plus Graham takes a look at Elon’s latest creations: a giggling anime girlfriend desperate for your attention, and a cute cartoon red panda who wants to bomb a synagogue and moon the rabbi.

Meanwhile Mark learns which AI is most likely to blackmail, lie, and – when the mood takes it – commit murder to avoid being switched off.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access 

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access 

Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation.
“In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company said in an alert.
The

Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate 

Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate 

Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign. 
The activity has been attributed by Arctic Wolf Labs to a financially motivated hacking group called Greedy Sponge. It’s believed to be active since early 2021, indiscriminately targeting a wide range of sectors, such as retail,

How to Advance from SOC Manager to CISO? 

How to Advance from SOC Manager to CISO? 

Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts. 
This article will guide you through the practical steps and skills you’ll need to nab an executive cybersecurity job and make the

Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access 

Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access 

The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research.
The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software

Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents 

Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents 

Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX.
Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool it tracks

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X