admin

admin

DHS Issues Warning: Potential Cyber Attacks from Pro-Iranian Hackers Following U.S. Airstrikes on Iranian Nuclear Sites

June 23, 2025
Hacktivism / Cyber Warfare

The U.S. government has issued a warning regarding possible cyber attacks from pro-Iranian groups in response to airstrikes on Iranian nuclear facilities, a key development in the ongoing Iran–Israel conflict that began on June 13, 2025. The Department of Homeland Security (DHS) highlighted a “heightened threat environment,” indicating that cyber actors are poised to target U.S. networks.

According to the DHS bulletin, “Low-level cyber attacks against U.S. networks by pro-Iranian hacktivists are likely, and actors linked to the Iranian government may also initiate attacks.” The department emphasized that both hacktivists and Iranian state-affiliated actors frequently exploit inadequately secured U.S. networks and internet-connected devices for disruptive cyber operations. This alert follows President Donald Trump’s announcement of U.S. military airstrikes on three Iranian nuclear sites at Fordo, Natanz, and…

DHS Issues Alert on Potential Cyber Threats from Pro-Iranian Hackers Following Military Strikes On June 23, 2025, the Department of Homeland Security (DHS) issued a warning regarding an increased risk of cyber-attacks from pro-Iranian hacker groups. This alert follows the…

Inc Ransomware Causes 1.2TB Data Breach at Dollar Tree

The infamous INC Ransomware group has asserted responsibility for a significant data breach involving Dollar Tree, a prominent American retail chain recognized for offering products primarily at $1.25 or lower. Despite its budget-friendly pricing strategy, Dollar Tree ranks among Fortune…

CISA Set to Publish Salt Typhoon Report During Senate Impasse

Critical Infrastructure Security, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Senator Maintains Hold on Trump’s CISA Nominee Amid Report Delays Chris Riotta (@chrisriotta)• July 30, 2025 Image: Adam McCullough/Shutterstock The U.S. Cybersecurity and Infrastructure Security Agency (CISA) plans to…

AI-Driven Security Reduces Breach Costs for UK Organizations

Recent findings indicate that British organizations employing artificial intelligence (AI) in their cybersecurity frameworks are witnessing significant reductions in data breach costs, with savings amounting to hundreds of thousands of pounds. This assertion is supported by the UK-specific segment of…

Hackers Exploit 70+ Microsoft Exchange Servers to Deploy Keyloggers for Credential Theft

June 24, 2025
Vulnerability / Malware

Unidentified threat actors have been targeting publicly exposed Microsoft Exchange servers to inject malicious code into login pages for credential harvesting. A recent analysis by Positive Technologies revealed two types of JavaScript keyloggers on the Outlook login page: one that saves captured data to a locally accessible file and another that transmits it directly to an external server. The Russian cybersecurity firm reported that these attacks affected 65 victims across 26 countries and continue a campaign first noted in May 2024, which targeted organizations in Africa and the Middle East. Initial findings indicated at least 30 victims among government agencies, banks, IT firms, and educational institutions, with evidence of compromises dating back to 2021. The attack chains exploit known vulnerabilities in Microsoft systems.

Cybersecurity Alert: Hackers Compromise Over 70 Microsoft Exchange Servers to Capture Credentials Date: June 24, 2025 In a concerning development for organizations reliant on Microsoft Exchange, unidentified threat actors have been targeting publicly accessible servers to deploy malicious code on…

Cybercriminals Utilize Open-Source Tools to Target Financial Institutions in Africa

Jun 26, 2025
Threat Intelligence / Ransomware

Cybersecurity experts are highlighting a wave of cyberattacks aimed at financial institutions across Africa, dating back to at least July 2023. These attacks leverage a combination of open-source and publicly available tools to sustain access. Researchers from Palo Alto Networks’ Unit 42 are monitoring this activity under the label CL-CRI-1014, where “CL” stands for “cluster” and “CRI” signifies “criminal motivation.” The primary objective appears to be gaining initial access to systems, which is then sold to other criminal actors in underground forums, effectively turning the threat actor into an initial access broker (IAB). “The threat actor mimics signatures from legitimate applications to create forged file signatures, camouflaging their toolset and concealing malicious activities,” noted researchers Tom Fakterman and Guy Levi. “Threat actors frequently spoof legitimate products for illicit purposes.” The attacks are marked by the use of tools such as PoshC2 and others.

Cyber Criminals Utilize Open-Source Tools to Target African Financial Institutions June 26, 2025 Threat Intelligence / Ransomware Recent investigations have revealed a troubling trend of cyber attacks aimed at financial institutions across Africa, with reports indicating that this wave of…

Breach Reports Continue to Emerge

3rd Party Risk Management, Data Breach Notification, Data Security More Than 410,000 Patients Reported Affected, Likely More to Come Marianne Kolbasuk McGee (HealthInfoSec) • July 29, 2025 Image: Oracle Following revelations of a hacking incident earlier this year that compromised…