Post

Security Affairs Newsletter Round 528: Comprehensive Overview of Global Cyber Security Updates

Explore the latest in global cyber security with Security Affairs Newsletter Round 528. Get insights on recent cyber attacks, data breaches, and more. Stay informed and secure.

Security Affairs Newsletter Round 528: Comprehensive Overview of Global Cyber Security Updates

TL;DR

This edition covers critical cybersecurity updates, including high-profile data breaches, newly discovered malware, and significant cyber attacks. Key highlights include the exposure of 300,000 crash reports from the Texas Department of Transportation, a cyberattack on United Natural Foods causing supply shortages, and the takedown of 20,000 malicious IPs by INTERPOL.

Main Content

Explore the Latest in Global Cyber Security with Security Affairs Newsletter Round 528

Welcome to the latest edition of the Security Affairs newsletter, your weekly dose of the most critical cybersecurity insights and updates from around the world.

International Press – Newsletter

Cybercrime

20,000 Malicious IPs and Domains Taken Down in INTERPOL Infostealer Crackdown

Skeleton Spider's Trusted Cloud Malware Delivery

Singapore Leads Multinational Operation to Shutter Scam Centers Tied to $225 Million in Thefts

Fog Ransomware: Unusual Toolset Used in Recent Attack

Cyberattack Leads to Whole Foods Shortages

Whole Foods Supplier United Natural Foods Reports Cyber Incident Disruption

Inside a Dark Adtech Empire Fed by Fake CAPTCHAs

Malware

Supply Chain Attack Hits Gluestack NPM Packages with 960K Weekly Downloads

Destructive npm Packages Disguised as Utilities Enable Remote System Wipe

Demystifying Myth Stealer: A Rust-Based InfoStealer

DanaBleed: DanaBot C2 Server Memory Leak Bug

Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability

Hacking

Bruteforcing the Phone Number of Any Google User

Hackers Stole 300,000 Crash Reports From Texas Department of Transportation

Big Brother Is Watching You

Catdoc Zero-Day, NVIDIA, High-Logic FontCreator, and Parallel Vulnerabilities

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

SmartAttack: Air-Gap Attack via Smartwatches

The TokenBreak Attack

Weaponizing Wholesome Yearbook Quotes to Break AI Chatbot Filters

JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique

Intelligence and Information Warfare

Disrupting Malicious Uses of AI: June 2025

Operation Phantom Enigma

Proxy Services Feast on Ukraine’s IP Address Exodus

Follow the Smoke: China-Nexus Threat Actors Target Top-Tier Organizations

Telegram, the FSB, and the Man in the Middle

Paragon Cancels Contracts with Italy Over Spyware Attack on Journalist

Sleep with One Eye Open: How Librarian Ghouls Steal Data by Night

UNC1151 Exploiting Roundcube to Steal User Credentials in Spearphishing Campaign

Meta Found a New Way to Violate Your Privacy. Here’s What You Can Do

First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Targets Journalists

Cybersecurity

DOJ Files Civil Forfeiture Complaint Against $7.74M Laundered for North Korea

Why the Revision of the Cybersecurity Act is the Most Consequential Regulatory Development of 2025

Defending Against Malware: The Invisible Enemy

AI Could Unleash ‘Deep Societal Upheavals’ That Many Elites Are Ignoring, Palantir CEO Warns

Apple Fixes New iPhone Zero-Day Bug Used in Paragon Spyware Hacks

Global Cybersecurity Market to Reach $1 Trillion Annually by 2031

Follow me on Twitter: @securityaffairs, Facebook, and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

Conclusion

The latest edition of the Security Affairs newsletter highlights the ever-evolving landscape of cyber threats. From significant data breaches to sophisticated malware attacks, the newsletter underscores the importance of vigilance and proactive security measures. Stay informed to protect against emerging threats and ensure the security of your digital assets.

For more details, visit the full article: source

This post is licensed under CC BY 4.0 by the author.