News The Hacker News China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated PhonesUNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin CampaignsIvanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike AttacksCERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing CampaignGoogle Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android DevicesCritical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud ServicesFrom Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of RansomwareHackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing FiltersHackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency MinerEuropol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against UkraineCTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom BackdoorsCisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root CodeHackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted FirmsUNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP RootkitCritical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent AccessAI Agents Act Like Employees With Root Access—Here's How to Regain ControlDeepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real TimeNew Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic CodeUrgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild Wired Security News How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyber SpiesHackers Are Finding New Ways to Hide Malware in DNS RecordsDHS Faces New Pressure Over DNA Taken From Immigrant ChildrenAdoption Agency Data Exposure Revealed Information About Children and ParentsThe FBI's Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut OutAI 'Nudify' Websites Are Raking in Millions of Dollars4 Arrested Over Scattered Spider Hacking SpreeMetadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely ModifiedDHS Tells Police That Common Protest Activities Are ‘Violent Tactics’McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’Android May Soon Warn You About Fake Cell TowersThe Person in Charge of Testing Tech for US Spies Has ResignedTrump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s UnconstitutionalCBP Wants New Tech to Search for Hidden Data on Seized PhonesThe Promise and Peril of Digital Security in the Age of DictatorshipA Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right NowIdentities of More Than 80 Americans Stolen for North Korean IT Worker ScamsICE Rolls Facial Recognition Tools Out to Officers' PhonesUS Supreme Court Upholds Texas Porn ID Law'They're Not Breathing': Inside the Chaos of ICE Detention Center 911 Calls Help Net Security News Strata Identity provides identity guardrails and observability for AI agentsWhy we must go beyond tooling and CVEs to illuminate security blind spotsMaking security and development co-owners of DevSecOpsAI adoption is booming but secure scaling not so muchBuy Now, Pay Later… with your dataNew infosec products of the week: July 18, 2025Stellar Cyber enhances identity security with ITDR capabilitiesReview: Passwork 7.0, self-hosted password manager for businessSocure Workforce Verification detects manipulated or fabricated identitiesLegit Security delivers automated security reviews for AppSec and development teamsAkeyless SecretlessAI protects machine-to-machine communicationWhat a mature OT security program looks like in practiceMachine unlearning gets a practical privacy upgradeWhy silent authentication is the smarter way to secure BYODWhat Fortune 100s are getting wrong about cybersecurity hiringTired of gaps in your security? These open-source tools can helpSonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkitUpdate Google Chrome to fix actively exploited zero-day (CVE-2025-6558)Immersive unveils role-specific cybersecurity capabilitiesGlobal crackdown hits pro-Russian cybercrime, 100+ systems taken down worldwide پلیس فتا سرقت دادههای خصوصی کاربران با لینکهای جعلی و دانلود کلیپ مناسبتیفریب تبلیغات غیرواقعی در فضای مجازی را نخوریدصفحه جعلي اينستاگرام، بستري براي کينهتوزي از خانم جوانورود به لینک جعلی ؛ دو میلیارد ریال برای شاکی آب خوردنشست تعاملی پلیس فتا با مدیر کل صدا و سیما استان سیستان و بلوچستان فروش خودرو بهانه ای شد برای کلاهبرداری در سایت دیوار دستگیری کلاهبرداران ۴۰ میلیاردی در خراسان شمالیهشدار! وام کمبهره یا وام فوری میتونه یه تله باشه!مایکروسافت آسیبپذیری روز صفر مورد استفاده برای جاسوسی سایبری را برطرف کردساخت یک دستگاه هک موبایل با پیکسل و کالی نتهانتر