Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for UK NCA Arrests Four  ...

 Firewall Daily

The UK’s National Crime Agency (NCA) has arrested four individuals suspected of orchestrating cyberattacks against retailers Marks & Spencer (M&S), Co-op, and Harrods. On July 10, 2025, the suspects were detained in the West Midlands and London as part of an extensive probe into the disruptive cyberattacks   show more ...

that occurred earlier this year.  The suspects include two 19-year-old males, a 17-year-old male, and a 20-year-old female. They face charges under the Computer Misuse Act, blackmail, money laundering, and involvement in an organized crime group. Among them is a 19-year-old Latvian national, while the others are British.  Coordinated Raids and Forensic Seizures Mark Arrests  Police conducted coordinated early morning raids at the suspects’ homes, seizing multiple electronic devices for digital forensic analysis. Neighbors in Staffordshire reported a significant police presence, with officers wearing balaclavas breaking down doors and collecting evidence. The West Midlands Regional Organized Crime Unit and the East Midlands Special Operations Unit supported the operation.  Paul Foster, Deputy Director and head of the NCA’s National Cyber Crime Unit, described the arrests as a “significant step” in an investigation that remains a high priority. He highlighted ongoing collaboration with UK and international law enforcement partners to ensure all responsible parties are identified and prosecuted.  “Cyberattacks can be hugely disruptive for businesses,” Foster said, thanking M&S, Co-op, and Harrods for their cooperation. He urged future victims to engage with law enforcement, noting that the NCA and policing agencies are ready to assist.  Impact of Retail Cyberattacks on M&S, Co-op, and Harrods  The cyberattacks, which began in mid-April 2025, have severely affected retailers. Co-op suffered weeks of empty shelves due to disrupted supply chains. M&S revealed that some IT systems might not be fully restored until October or November, with estimated losses of £300 million in profits. The chairman of M&S described the incident as a “deliberate attempt to destroy the business.”  Victims of cybercrime are encouraged to use the Government’s Cyber Incident Signposting Site for clear guidance on reporting incidents and accessing support, helping to improve coordination between businesses and law enforcement. The recent arrests send a clear message that retail cyberattacks are being taken seriously, but as these threats grow more frequent, ongoing investigations, advanced forensic efforts, and strong collaboration will be crucial to protecting UK retailers and consumers alike. 

image for What an SMS blaster  ...

 Threats

Fake text messages pretending to be from banks, delivery services, or municipal agencies are scammers tactic of choice to trick people into revealing financial information and passwords. This type of phishing is often referred to as smishing (from SMS phishing). While nearly every carrier filters dangerous text   show more ...

messages, and only a fraction reach recipients, scammers have come up with something new. Over the past year, criminals have been arrested in the UK, Thailand, and New Zealand for sending messages that bypassed carrier networks and went directly to victims phones. This technology is known as SMS blasting. What is an SMS blaster? An SMS blaster pretends to be a cellular base station. About the size of an old computer tower, it bristles with antennas. Scammers often stash it in the trunk of a car or even in a backpack. Once activated, the blaster prompts all nearby phones to connect to it, as it appears to be the most powerful base station with the best signal. When a phone connects, it receives a fake SMS. Depending on the blaster model and reception conditions, the SMS broadcast range is between around 500 and 2000 meters. This is why criminals prefer to operate in crowded areas like shopping malls, or tourist and business centers: these are where all known attacks have been recorded. Whats more, the tech the scammers use provides them with all sorts of tricks: they dont pay for the messages, they can spoof any sender, and theyre free to include any links at all; they dont even need to know victims phone numbers: any phone will receive a message if it connects to the fake cell tower. How an SMS blaster works An SMS blaster exploits vulnerabilities in the 2G (GSM) communication standard. While 2G is primarily used today in remote, sparsely populated areas, all phones still support it. First, the blaster sends a technical signal over modern 4G/5G networks. When any phone or smartphone receives this signal, it attempts to switch to a 2G network. Simultaneously, the blaster broadcasts fake 2G base-station signals. The victims smartphone recognizes these as legitimate carrier signals and connects. Unlike the 3G, 4G, and 5G standards – where the smartphone and base station always perform a mutual cryptographic check during connection – this feature was only optional in 2G. This loophole allows an SMS blaster to mimic any carrier. Once connected, it can send any text message to a smartphone. After transmitting the SMS, the fake base station disconnects, and the smartphone reverts to its normal 4G/5G network with its legitimate carrier. Perhaps surprisingly, this technology isnt new. Similar to blasters, devices known as IMSI catchers, StingRays, or cell site simulators, have been used by law enforcement and intelligence agencies to gather data on individuals attending events of interest. However, criminals have found a new use for the technology. Defending against SMS blasters You can block fake text messages by disabling 2G network connectivity on your smartphone, but thats a double-edged sword. If you live in an area with poor signal or far from major cities, your phone might still occasionally use 2G. This is why many carriers havent completely phased out the outdated technology. If you havent seen the 2G icon (an E or G next to your signal-strength indicator) in years, you might want to consider this option. Android phones running version 12 or newer offer the ability to disable 2G, but not every vendor makes this toggle visible and accessible. Android 16 introduced notifications that alert you if your smartphone might be connected to a fake 2G tower, but due to hardware limitations these only work on certain newer smartphones. Theres no similar option in iOS, but you can effectively disable 2G by activating Lockdown Mode. Unfortunately, this does far more than just turn off 2G; it significantly restricts many iPhone functions in the name of maximum security (many would say it renders an iPhone practically unusable). To avoid sacrificing your phones functionality while still protecting yourself from dangerous text messages, consider using a comprehensive smartphone security system. SMS blasts will still be delivered to your phone, but they wont cause harm thanks to two layers of protection. The system identifies malicious messages regardless of the cellular network and blocks SMS spam (only on Android devices), while phishing protection prevents you from navigating to dangerous websites (on all smartphones). Beyond technical measures, vigilance and general precautions are crucial in combating fake text messages. Instead of tapping links, sign in to your banking app or delivery service website directly from your bookmarks, your smartphones home screen, or by manually typing the address into your browser. What other tricks do scammers use to try and sneak into your smartphone? Data theft during smartphone charging Trojan embedded in fake Android smartphones Remote hacking of Samsung, Google and Vivo smartphones: the problem and the solution How smartphones build a dossier on you Are your TV, smartphone, and smart speakers eavesdropping on you?

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities (KEV) catalog, officially confirming the vulnerability has been weaponized in the wild. The shortcoming in question is CVE-2025-5777 (CVSS score: 9.3), an instance of insufficient input validation that

 Feed

Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution on millions of transport vehicles from different vendors. The vulnerabilities, dubbed PerfektBlue, can be fashioned together as an exploit chain to run arbitrary code on cars from at least three major automakers,

 Feed

The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach to data security can help. As businesses increasingly rely on cloud-driven platforms and AI-powered tools to accelerate digital transformation, the stakes for safeguarding sensitive enterprise data have reached unprecedented levels. The Zscaler ThreatLabz

 Feed

A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked as CVE-2025-47812 (CVSS score: 10.0), is a case of improper handling of null ('') bytes in the server's web interface, which allows for remote code execution. It has been addressed in version 7.4.4. "The user and

 Feed

An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger payouts to cybercriminals who launch attacks against Israel and the U.S. The financially motivated scheme, now operating under the moniker Pay2Key.I2P, is assessed to be linked to a hacking group tracked as Fox Kitten (aka Lemon Sandstorm). "

 Feed

Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to run arbitrary database commands on susceptible instances. Tracked as CVE-2025-25257, the vulnerability carries a CVSS score of 9.6 out of a maximum of 10.0. "An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in

 AirMDR

Source: www.securityweek.com – Author: Ionut Arghire AI-native managed detection and response (MDR) startup AirMDR has announced raising $15.5 million in a funding round that combines seed and infusion investments. The funding round was led by Race Capital, with additional support from earlier investors   show more ...

Foundation Capital and Storm Ventures. Founded in 2023, Menlo Park, California-based AirMDR […] La entrada AirMDR Raises $15.5 Million for MDR Solution – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Critical

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) commands. The vulnerability, tracked as CVE-2025-6514, carries a CVSS score of 9.6 out of 10.0.   show more ...

“The vulnerability allows attackers to trigger arbitrary OS command execution on the […] La entrada Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malware that can drain digital assets from both Windows and macOS systems. “These malicious operations impersonate AI,   show more ...

gaming, and Web3 firms using spoofed social media accounts and project documentation […] La entrada Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 arrested

Source: thehackernews.com – Author: . The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retailers Marks & Spencer, Co-op, and Harrods. The arrested individuals include two men aged 19, a third aged 17, and a   show more ...

20-year-old woman. They were apprehended in the […] La entrada Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Generative AI is not arriving with a bang, it’s slowly creeping into the software that companies already use on a daily basis. Whether it is video conferencing or CRM, vendors are scrambling to integrate AI copilots and assistants into their SaaS applications. Slack can   show more ...

now provide AI summaries of chat […] La entrada What Security Leaders Need to Know About AI Governance for SaaS – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized versions of legitimate software. SentinelOne, in a new report shared with The Hacker News, said the malware has been   show more ...

observed masquerading as the cross‑platform SSH client and server‑management tool […] La entrada New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. The flaws, collectively called Transient Scheduler Attacks (TSA), manifest in the form of a speculative side channel in its   show more ...

CPUs that leverage execution timing of instructions under […] La entrada AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: krebsonsecurity.com – Author: BrianKrebs Authorities in the United Kingdom this week arrested four people aged 17 to 20 in connection with recent data theft and extortion attacks against the retailers Marks & Spencer and Harrods, and the British food retailer Co-op Group. The breaches have been   show more ...

linked to a prolific but loosely-affiliated cybercrime group […] La entrada UK Arrests Four in ‘Scattered Spider’ Ransom Group – Source: krebsonsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Large language models (LLMs) are still falling short in performing vulnerability discovery and exploitation tasks. Many threat actors therefore remain skeptical about using AI tools for such roles. This is according to new research by Forescout Research – Vedere   show more ...

Labs, which tested 50 current AI models from commercial, open source and […] La entrada LLMs Fall Short in Vulnerability Discovery and Exploitation – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The Irish Data Protection Commission (DPC) has launched a new inquiry into the storage of European users’ data on servers in China, just two months after it fined the company €530m for similar reasons. The probe into TikTok, which is owned by Chinese firm   show more ...

ByteDance but has European headquarters in Dublin, […] La entrada TikTok’s Handling of EU User Data in China Comes Under Scrutiny Again – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 arrested

Source: www.infosecurity-magazine.com – Author: Four individuals have been arrested on suspicion of involvement in the April cyber-attacks targeting three prominent UK retailers – Marks & Spencer (M&S), Co-op and Harrods. Law enforcement action took place on the morning of July 10, with the suspects   show more ...

currently in custody for questioning by the National Crime Agency’s (NCA) […] La entrada Four Arrested in Connection with April UK Retail Attacks – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: NS Solutions, an IT services provider owned by the Japanese conglomerate Nippon Steel, has confirmed that data from employees, partners and customers may have been leaked following a cyber-attack. According to a statement published in Japanese on July 8, NS   show more ...

Solutions, also known as Nittetsu Solutions and Nippon Steel Solutions, detected […] La entrada Nippon Steel IT Subsidiary Hit by “Zero-Day Attack,” Causing Data Breach – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The UK’s privacy watchdog has cleared a major hurdle in its long-running bid to fine TikTok over alleged UK GDPR infringements, after a tribunal ruled in its favor. The “First-tier Tribunal” decision confirmed that the Information Commissioner’s Office   show more ...

(ICO) did in fact have the power to issue a monetary penalty notice […] La entrada Tribunal Ruling Brings ICO’s £12.7m TikTok Fine Closer – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Qantas has confirmed that nearly six million customers have had their personal data compromised in a recent breach. The Australian airline said that most (four million) of those affected had their name, email address and Qantas Frequent Flyer details exposed in   show more ...

the incident. Of these individuals, 1.2 million had only their name […] La entrada Qantas Confirms 5.7 Million Customers Hit by Data Breach – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0ktapus

Source: securityboulevard.com – Author: Richi Jennings Alleged arachnid arrests: Three teenage males and a young woman hauled away by cops, suspected of hacking huge retailers. The post 4 Arrests in Dawn Raid of Scattered-Spider Suspects appeared first on Security Boulevard. Original Post URL:   show more ...

https://securityboulevard.com/2025/07/arrests-scattered-spider-richixbw/?utm_source=rss&utm_medium=rss&utm_campaign=arrests-scattered-spider-richixbw Category & Tags: Analytics & Intelligence,Cyberlaw,Cybersecurity,Data Privacy,Data Security,DevOps,Featured,Governance, Risk & Compliance,Humor,Identity […] La entrada 4 Arrests in Dawn Raid of Scattered-Spider Suspects – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: securityboulevard.com – Author: Nir Stern The world of software development is changing fast. AI isn’t just influencing software – it’s reshaping how software is written and the components it’s made of. First, AI-generated code is accelerating development. Code is produced faster, in larger   show more ...

volumes, and often without the same level of review or accountability […] La entrada Why your AppSec Tool Stack Is Failing in the Age of AI – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 agentic ai

Source: securityboulevard.com – Author: Randolph Barr The shift to agentic AI isn’t just a technical challenge — it’s a leadership opportunity for CISOs to redefine their role from control enforcer to strategic enabler. The post The Rise of Agentic AI: A New Frontier for API Security appeared first on   show more ...

Security Boulevard. Original Post URL: https://securityboulevard.com/2025/07/the-rise-of-agentic-ai-a-new-frontier-for-api-security/?utm_source=rss&utm_medium=rss&utm_campaign=the-rise-of-agentic-ai-a-new-frontier-for-api-security […] La entrada The Rise of Agentic AI: A New Frontier for API Security – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Citrix

Source: thehackernews.com – Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities (KEV) catalog, officially confirming the vulnerability has been weaponized in the   show more ...

wild. The shortcoming in question is CVE-2025-5777 (CVSS score: 9.3), an instance of […] La entrada CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Major security flaw in McDonald’s AI hiring tool McHire exposed 64M job applications. Discover how an IDOR vulnerability and weak default credentials led to a massive leak of personal data and the swift remediation by Paradox.ai. A vulnerability in McHire, the   show more ...

AI-powered recruitment platform used by a vast majority […] La entrada McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Simon Sharwood On Call Welcome once again to On Call, The Register‘s Friday column that shares your stories of tech support terror and triumph. This week, meet a fellow reader we’ll Regomize as “Boris” who shared a story from his time working at a   show more ...

cybersecurity firm that specialized in email and […] La entrada Security company hired a used car salesman to build a website, and it didn’t end well – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Iain Thomson A Russian professional basketball player is cooling his heels in a French detention center after being arrested and accused of acting as a negotiator for a ransomware gang. Daniil Kasatkin, 26, was arrested at Charles de Gaulle Airport outside Paris on June 21   show more ...

after flying in with his fiancée, […] La entrada French cops cuff Russian pro basketball player on ransomware charges – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Chinese

Source: go.theregister.com – Author: Simon Sharwood Anti-censorship organization GreatFire.org has accused Singapore infosec outfit Group-IB of helping Chinese web giant Tencent to quell its activities. GreatFire researches China’s censorship efforts and publishes data about the material and apps Beijing   show more ...

blocks. The organization also archives material censored from Chinese websites at sites like FreeWeChat.com, which hosts […] La entrada Chinese censorship-busters claim Tencent is trying to kill its WeChat archive – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Jessica Lyons A lovestruck US Air Force employee has pleaded guilty to conspiring to transmit confidential national defense information after sharing military secrets information about the Russia-Ukraine war with a woman he met on a dating app. David Franklin Slater, a   show more ...

64-year-old Nebraska resident and retired US Army lieutenant colonel, worked […] La entrada Lovestruck US Air Force worker admits leaking secrets on dating app – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Jessica Lyons The US Cybersecurity and Infrastructure Security Agency has added its weighty name to the list of parties agreeing that CVE-2025-5777, dubbed CitrixBleed 2 by one researcher, has been under exploitation and abused to hijack user sessions. On Thursday, CISA   show more ...

added the critical security flaw to its catalog of Known […] La entrada Now everybody but Citrix agrees that CitrixBleed 2 is under exploit – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-07
TUE
WED
THU
FRI
SAT
SUN
MON
JulyAugustSeptember