Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

International Press – Newsletter

Cybercrime

Crypto swapping service “eXch” shut down  

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

How Interlock Ransomware Affects the Defense Industrial Base Supply Chain 

Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States

Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data

Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines  

Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins

Senior US Officials Impersonated in Malicious Messaging Campaign 

Malware

PupkinStealer : A .NET-Based Info-Stealer 

Interlock ransomware evolving under the radar 

High Risk Warning for Windows Ecosystem: New Botnet Family HTTPBot is Expanding

Printer maker Procolored offered malware-laced drivers for months 

Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT

Hacking

One-Click RCE in ASUS’s Preinstalled Driver Software

Revealed — The Hackers Behind The World’s Most Prolific Cyberattacks

SAP Zero – Frostbite: How Russian RaaS Actor Qilin Exploited CVE-2025-31324 Weeks Before its Public Disclosure    

Intelligence and Information Warfare

Marbled Dust leverages zero-day in Output Messenger for regional espionage 

China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures 

TA406 Pivots to the Front

ReliaQuest Uncovers New Critical Vulnerability in SAP NetWeaver 

Robot Soldiers, Neural Networks: How Machine Vision Is Changing Warfare

Chinese ‘kill switches’ found hidden in US solar farms 

Operation RoundPress 

Cybersecurity

Google to pay Texas $1.4 billion in data privacy settlement 

The May 2025 Security Update Review

Protecting Our Customers – Standing Up to Extortionists  

Nova Scotia Power confirms hackers stole customer data in cyberattack

‘They yanked their own plug’: How Co-op averted an even worse cyber attack

noyb sends Meta ‘cease and desist’ letter over AI training. European Class Action as potential next step   

Cofense Reveals Rapid Rise in AI-Powered Phishing: New Threat Every 42 Seconds

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS