• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Stormous Ransomware gang targets North Country HealthCare, claims 600K patient data stolen

 | 

United Natural Foods Expects $400M revenue impact from June cyber attack

 | 

Cisco patches critical CVE-2025-20337 bug in Identity Services Engine with CVSS 10 Severity

 | 

UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations

 | 

Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)

 | 

Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network

 | 

Former US Army member confesses to Telecom hack and extortion conspiracy

 | 

CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025

 | 

DDoS peaks hit new highs: Cloudflare mitigated massive 7.3 Tbps assault

 | 

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

 | 

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

Pierluigi Paganini May 18, 2025

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
Shields up US retailers. Scattered Spider threat actors can target them
U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
New botnet HTTPBot targets gaming and tech industries with surgical attacks
Meta plans to train AI on EU user data from May 27 without consent
AI in the Cloud: The Rising Tide of Security and Privacy Risks
Google fixed a Chrome vulnerability that could lead to full account takeover
Nova Scotia Power discloses data breach after March security incident
Coinbase disclosed a data breach after an extortion attempt
U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog
Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc
U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
Ivanti fixed two EPMM flaws exploited in limited attacks
Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days
Fortinet fixed actively exploited FortiVoice zero-day
How Interlock Ransomware Affects the Defense Industrial Base Supply Chain
Marks and Spencer confirms data breach after April cyber attack
Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies
APT group exploited Output Messenger Zero-Day to target Kurdish military operating in Iraq
Apple released security updates to fix multiple flaws in iOS and macOS
U.S. CISA adds TeleMessage TM SGNL to its Known Exploited Vulnerabilities catalog
Researchers found one-click RCE in ASUS’s pre-installed software DriverHub
Threat actors use fake AI tools to deliver the information stealer Noodlophile
German police seized eXch crypto exchange
Google will pay Texas $1.4 billion over its location tracking practices

International Press – Newsletter

Cybercrime

Crypto swapping service “eXch” shut down  

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

How Interlock Ransomware Affects the Defense Industrial Base Supply Chain 

Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States

Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data

Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines  

Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins

Senior US Officials Impersonated in Malicious Messaging Campaign 

Malware

PupkinStealer : A .NET-Based Info-Stealer 

Interlock ransomware evolving under the radar 

High Risk Warning for Windows Ecosystem: New Botnet Family HTTPBot is Expanding

Printer maker Procolored offered malware-laced drivers for months 

Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT

Hacking

One-Click RCE in ASUS’s Preinstalled Driver Software

Revealed — The Hackers Behind The World’s Most Prolific Cyberattacks

SAP Zero – Frostbite: How Russian RaaS Actor Qilin Exploited CVE-2025-31324 Weeks Before its Public Disclosure    

Intelligence and Information Warfare

Marbled Dust leverages zero-day in Output Messenger for regional espionage 

China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures 

TA406 Pivots to the Front

ReliaQuest Uncovers New Critical Vulnerability in SAP NetWeaver 

Robot Soldiers, Neural Networks: How Machine Vision Is Changing Warfare

Chinese ‘kill switches’ found hidden in US solar farms 

Operation RoundPress 

Cybersecurity

Google to pay Texas $1.4 billion in data privacy settlement 

The May 2025 Security Update Review

Protecting Our Customers – Standing Up to Extortionists  

Nova Scotia Power confirms hackers stole customer data in cyberattack

‘They yanked their own plug’: How Co-op averted an even worse cyber attack

noyb sends Meta ‘cease and desist’ letter over AI training. European Class Action as potential next step   

Cofense Reveals Rapid Rise in AI-Powered Phishing: New Threat Every 42 Seconds

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)


facebook linkedin twitter

Cybercrime data breach Hacking hacking news information security news IT Information Security malware Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini July 17, 2025
Stormous Ransomware gang targets North Country HealthCare, claims 600K patient data stolen
Read more
Pierluigi Paganini July 17, 2025
United Natural Foods Expects $400M revenue impact from June cyber attack
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Stormous Ransomware gang targets North Country HealthCare, claims 600K patient data stolen

    Data Breach / July 17, 2025

    United Natural Foods Expects $400M revenue impact from June cyber attack

    Security / July 17, 2025

    Cisco patches critical CVE-2025-20337 bug in Identity Services Engine with CVSS 10 Severity

    Security / July 17, 2025

    UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations

    Hacking / July 17, 2025

    Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)

    Cyber Crime / July 16, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT