Security Affairs newsletter Round 526 by Pierluigi Paganini – INTERNATIONAL EDITION

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

International Press – Newsletter

Cybercrime

DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers  

The Epic Rise and Fall of a Dark-Web Psychedelics Kingpin 

Threat Spotlight: Hijacked Routers and Fake Searches Fueling Payroll Heist 

Dark Partners cybercrime gang fuels large-scale crypto heists 

ConnectWise Confirms ScreenConnect Cyberattack, Says Systems Now Secure: Exclusive

Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025 

Steal, deal and repeat: How cybercriminals trade and exploit your data  

Websites selling hacking tools to cybercriminals seized 

Malware

60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign

Inside a VenomRAT Malware Campaign

Fake Google Meet Page Tricks Users into Running PowerShell Malware

PyBitmessage Backdoor Malware Installed with CoinMiner 

PumaBot: Novel Botnet Targeting IoT Surveillance Devices    

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers  

Hacking

Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking  

The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598 

Intelligence and Information Warfare

China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability  

Mysterious hacking group Careto was run by the Spanish government, sources say

Russian hacker group Killnet returns with new identity  

New Russia-affiliated actor Void Blizzard targets critical sectors for espionage 

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents  

AIVD and MIVD recognize new Russian cyber actor

Chinese spies blamed for attempted hack on Czech government network  

Mark Your Calendar: APT41 Innovative Tactics 

Earth Lamia Develops Custom Arsenal to Target Multiple Industries

Lazarus Group Targets Crypto-Wallets and Financial Data while employing new Tradecrafts 

Cybersecurity

The App Store prevented more than $9 billion in fraudulent transactions over the last five years

Cyber: Statement by the High Representative on behalf of the European Union on malicious behaviour in cyberspace against Czechia    

Anthropic’s new AI model turns to blackmail when engineers try to take it offline

Victoria’s Secret Website Taken Offline After Cyberattack

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more 

Treasury Takes Action Against Major Cyber Scam Facilitator  

Integrity Reports, First Quarter 2025

Meta’s Adversarial Threat Report, First Quarter 2025

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 2 years ago

LATEST POSTS