1
Cybersecurity News
•
2 hours ago
Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w 4K V2 mouse configuration tool to spread dangerous Xred malware to unsuspecting customers for nearly two weeks. The security breach, which occurred between June 26 and July 9, 2025, represents a troubling example of supply […]
2
GB Hackers
•
2 hours ago
Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities
Chinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for international cybersecurity efforts.
Microsoft is probing whether a leak from its confidential early warning system enabled Chinese state- hackers to exploit significant flaws in its SharePoint software, leading to breaches at over 400 organizations, including the
3
Cybersecurity News
•
4 hours ago
Microsoft Corp. is investigating whether a leak from its Microsoft Active Protections Program (MAPP) enabled Chinese state- hackers to exploit critical SharePoint vulnerabilities before patches were fully deployed, according to sources familiar with the matter. The investigation comes as cyber espionage attacks have compromised more than 400 organizations worldwide, including the U.S. National Nuclear Security […]
4
Security Brief UK
•
5 hours ago
Lab 1 report reveals unstructured data heightens breach risks
Lab 1 has released a report that analyses 141 million files from 1,297 data breach incidents, highlighting significant risks of downstream fraud and cybercrime for organisations, employees and customers.
The Anatomy of a Breach 2025 report offers an in-depth content-level investigation of breached datasets, focusing on the prevalence of unstructured files, such as financial documents, HR data, customer records and code files, that are
5
ThreatCluster
•
12 hours ago
# Daily Threat Intelligence Brief - July 26, 2025
## Executive Summary
Today's threat landscape remains dynamic and increasingly complex, with a notable rise in attacks targeting critical infrastructure and enterprise services. The most pressing threats stem from **phishing campaigns**, **ransomware attacks**, and **vulnerabilities in widely-used platforms** such as Microsoft SharePoint and AWS. With global ransomware incidents reportedly down 43% in the second quarter, the threat actors are r