![]() |
Description: Spain’s Interior Ministry said the suspects were responsible for stealing and leaking personal data belonging to high-ranking political figures, including Prime Minister Pedro Sánchez, President of the Congress of Deputies Francina Armengol and Catalonia’s President Salvador Illa.
July 2nd, 2025 (about 14 hours ago)
|
![]() |
Description: More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wallet credentials and sensitive data. [...]
July 2nd, 2025 (about 15 hours ago)
|
![]() |
Description: By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them.
July 2nd, 2025 (about 15 hours ago)
|
![]() |
Description: Qantas Airways has confirmed a cyber incident involving unauthorized access to a third-party customer servicing platform used in one of its contact centers, resulting in the exposure of sensitive customer information. While the airline’s core systems remain unaffected, the breach could potentially impact millions of customers. The breach was discovered on Monday, June 30, when …
The post Qantas Confirms Cyberattack on Call Center Exposing Customer Data appeared first on CyberInsider.
July 2nd, 2025 (about 15 hours ago)
|
![]() |
Description: There are various approaches to managing vulnerabilities on cloud workloads, and knowing which vulnerability scan method to use is critical to your success. However, there isn’t a universally correct choice. How can you identify the best approach for you?While network-based, agent-based, and agentless vulnerability scans all identify vulnerabilities, there are tradeoffs, and the ideal approach depends on your specific use case, requirements and constraints. This blog explores the different methods and discusses their application to virtual machines and containerized workloads.Cloud vulnerability management overview(Tenable Cloud Security: Vulnerability management dashboard widgets)Cloud vulnerability management focuses on scanning the base operating systems, such as Linux and Windows, and other software installed on cloud instances to identify vulnerabilities. Although vulnerability management has been done for decades, your public cloud workloads may benefit from a different approach.Traditional scan methods like network scans and agent installations, such as Tenable’s Nessus Agents, may be viable options for long-lived virtual machines in some public cloud environments. However, these methods are not ideal for short-lived virtual machines and containerized workloads. It all comes down to understanding the best approach for acquiring vulnerability data for a given use case.Scanning public cloud virtual machinesYou may have public-cloud virtual machines that closely resemb...
July 2nd, 2025 (about 15 hours ago)
|
![]() |
Description: Australian airline Qantas alerted customers and authorities about a data breach at a contact center. The industry remains on edge after cyberattacks on airlines elsewhere.
July 2nd, 2025 (about 15 hours ago)
|
![]() |
Description: AT&T has launched Wireless Account Lock, a new security feature that allows customers to block unauthorized changes to their wireless accounts directly from the myAT&T app. The new feature is designed to counter common attack methods such as SIM swapping and fraudulent device purchases, offering users a simple way to assert greater control over sensitive …
The post AT&T Launches ‘Wireless Account Lock’ to Protect Users from SIM Swaps appeared first on CyberInsider.
July 2nd, 2025 (about 16 hours ago)
|
![]() |
Description: Cybercriminals are extorting the German humanitarian aid group Welthungerhilfe (WHH) for 20 bitcoin. The charity said it will not pay.
July 2nd, 2025 (about 16 hours ago)
|
![]() |
July 2nd, 2025 (about 16 hours ago)
|
CVE-2025-46647 |
Description: A vulnerability of plugin openid-connect in Apache APISIX.
This vulnerability will only have an impact if all of the following conditions are met:
1. Use the openid-connect plugin with introspection mode
2. The auth service connected to openid-connect provides services to multiple issuers
3. Multiple issuers share the same private key and relies only on the issuer being different
If affected by this vulnerability, it would allow an attacker with a valid account on one of the issuers to log into the other issuer.
This issue affects Apache APISIX: until 3.12.0.
Users are recommended to upgrade to version 3.12.0 or higher.
EPSS Score: 0.02%
July 2nd, 2025 (about 16 hours ago)
|