loader from loading.io

North Korean crypto theft, Microsoft rolls out back up, four charged in global scheme

Cyber Security Headlines

Release Date: 08/12/2025

npm update, Cursor Autorun flaw details, Microsoft probe over Ascension hack? show art npm update, Cursor Autorun flaw details, Microsoft probe over Ascension hack?

Cyber Security Headlines

The npm incident: nothing to fret about? Cursor Autorun flaw lets repositories execute code without consent Senator Wyden urges FTC to probe Microsoft over Ascension hack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with . Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO...

info_outline
Blood center attack details emerge, Electoral Commission recovers, Plex suffers password breach show art Blood center attack details emerge, Electoral Commission recovers, Plex suffers password breach

Cyber Security Headlines

Thousands had data leaked in blood center ransomware attack UK Electoral Commission recovers, 3 years after China hack Npm packages with 2 billion weekly downloads targeted in supply chain attack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with . Vanta brings automation to evidence collection across over 35...

info_outline
GhostAction campaign, scam centers grow, GPUGate hits IT show art GhostAction campaign, scam centers grow, GPUGate hits IT

Cyber Security Headlines

GhostAction campaign targets GitHub Scam centers see huge growth in Myanmar GPUGate targets IT firms Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with . Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews,...

info_outline
SVG phishing campaign, Anthropic piracy lawsuit, Qantas penalizes executives show art SVG phishing campaign, Anthropic piracy lawsuit, Qantas penalizes executives

Cyber Security Headlines

New malware phishing campaign hidden in SVG files Anthropic agrees to pay $1.5bn in book piracy lawsuit Qantas penalizes executives for cyberattack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with . Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize...

info_outline
Week in Review: Baltimore’s expensive gaffe, ransomware takedown outcomes, Workiva Salesforce breach show art Week in Review: Baltimore’s expensive gaffe, ransomware takedown outcomes, Workiva Salesforce breach

Cyber Security Headlines

Link to This week’s Cyber Security Headlines – Week in Review is hosted by with guest , vp of information security, Thanks to our show sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . All links and the video of this episode can be found on    

info_outline
France cookie fines, CISA TP-Link KEV, sports piracy takedown show art France cookie fines, CISA TP-Link KEV, sports piracy takedown

Cyber Security Headlines

France fines Google and Shein over cookie misconduct CISA adds more TP-Link routers flaws to its KEV catalog World’s largest sports piracy site shut down Huge thanks to our sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind the headlines at .

info_outline
Fintech foils bank heist, NotDoor backdoor, Salesloft-Drift impact continues drifting show art Fintech foils bank heist, NotDoor backdoor, Salesloft-Drift impact continues drifting

Cyber Security Headlines

Fintech foils bank heist NotDoor backdoor Salesloft-Drift impact continues drifting Huge thanks to our sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind the headlines at .

info_outline
Google: Gmail is secure, Cloudflare blocks largest DDoS attack, Amazon shutters theft campaign show art Google: Gmail is secure, Cloudflare blocks largest DDoS attack, Amazon shutters theft campaign

Cyber Security Headlines

'2.5 billion Gmail users at risk'? Entirely false, says Google Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps Jaguar Land Rover says cyberattack ‘severely disrupted’ production Huge thanks to our sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit .

info_outline
LLM legalese prompts, Maryland Transit cyberattack, hacking into university show art LLM legalese prompts, Maryland Transit cyberattack, hacking into university

Cyber Security Headlines

LegalPwn technique hides LLMs prompts inside contract legalese Maryland Transit investigating cyberattack Hacker attempts to forge his way into Spanish university Huge thanks to our sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind the headlines at .

info_outline
Velociraptor C2 tunnel, Baltimore’s expensive con, ransomware gangs multiply show art Velociraptor C2 tunnel, Baltimore’s expensive con, ransomware gangs multiply

Cyber Security Headlines

Velociraptor forensic tool used for C2 tunneling City of Baltimore gets socially engineered to the tune of $1.5 million Ransomware gang takedowns create more smaller groups Huge thanks to our sponsor, ThreatLocker is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind the headlines at .

info_outline
 
More Episodes

North Korean crypto theft

Microsoft rolls out PC back up during attack

U.S. charges four in $100M global fraud scheme

Huge thanks to our sponsor, Vanta

Do you know the status of your compliance controls right now? Like...right now?

We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks.

But more than 9,000 companies have continuous visibility into their controls with Vanta.

Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001.

They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI.

Now that’s…a new way to GRC. Get started at Vanta.com/headlines