Tuesday , June 24 2025

TimeLine Layout

June, 2025

  • 1 June

    Hacker claim Leak of Deloitte Source Code & GitHub Credentials

    GitHub

    A hacker known as “303” claim to breach the company’s systems and leaked sensitive internal data on a dark web forum. The reported breach involves GitHub credentials and source code from Deloitte’s U.S. consulting division’s internal project repositories. Medium reports, “On May 30, 2025, Deloitte, a leading global consulting firm, …

    Read More »
  • 1 June

    CISA Issued Guidance for SIEM and SOAR Implementation

    SIEM and SOAR

    CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM and SOAR help organizations analyze data from firewalls, endpoints, and applications to improve detection and response to cybersecurity incidents. However, many face implementation challenges due to high costs and ongoing …

    Read More »

May, 2025

  • 31 May

    Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

    core dump

    The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities. CVE-2025-5054 affects Ubuntu’s core-dump handler, Apport, while CVE-2025-4598 targets systemd-coredump, the default core-dump handler on Red Hat Enterprise Linux 9 and 10, as well as Fedora. These vulnerabilities allow a …

    Read More »
  • 31 May

    Australia enacts mandatory ransomware payment reporting

    Australia

    New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of AUS $3 million ($1.93 million). Australia’s Cyber Security Act 2024 applies to private companies managing critical infrastructure assets. Organizations must report any ransomware payments to the Australian Signals Directorate (ASD) …

    Read More »
  • 31 May

    Why Govt Demands Foreign CCTV Firms to Submit Source Code?

    CCTV

    Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require manufacturers of CCTV cameras to submit hardware, software and source code for assessment in government labs, official documents and company emails show. The security-testing policy has sparked industry warnings of …

    Read More »
  • 29 May

    CVE-2023-39780
    Botnet hacks thousands of ASUS routers

    ASUS routers

    GreyNoise has discovered a campaign where attackers have gained unauthorized access to thousands of internet-exposed ASUS routers. This seems to be part of a covert effort to create a network of backdoor devices, possibly aiming to establish a botnet in the future. The tactics in this campaign—sneaky initial access, using …

    Read More »
  • 28 May

    Bangladesh Bank instructed using AI to prevent online gambling

    gambling

    The rise of online gambling in the country is leading to increased crime and societal issues. In response, the central bank has implemented strict measures to curb these activities. On Wednesday, May 28, the Payment Systems Department of Bangladesh Bank instructed all banks and financial institutions to enhance monitoring of …

    Read More »
  • 28 May

    251 Amazon-Hosted IPs Used in Exploit Scan for ColdFusion, Struts, and Elasticsearch

    Scan

    Cybersecurity researchers recently revealed a coordinated cloud-based scanning attack that targeted 75 different exposure points earlier this month. On May 8, 2025, GreyNoise observed activity from 251 malicious IP addresses located in Japan and hosted by Amazon. “These IPs triggered 75 distinct behaviors, including CVE exploits, misconfiguration probes, and recon …

    Read More »
  • 26 May

    Zero-Trust Policy bypass to Exploit Vulns & Manipulate NHI Secrets

    zero-trust

    Recent security research has shown that attackers can weaken zero-trust security frameworks by exploiting a key DNS vulnerability, disrupting automated secret rotation. The research reveals a complex attack chain that starts with disrupting DNS servers and ends with unauthorized access to cloud services, exposing serious flaws in Non-Human Identity (NHI) …

    Read More »
  • 24 May

    Evaly E-commerce Platform Allegedly Hacked

    Evaly

    Evaly, a Bangladeshi e-commerce platform, is reportedly facing a major data breach that may have exposed sensitive information of around 783,611 customers and merchants. This incident is said to have occurred today, May 23, 2025. Evaly’s website currently displays a message stating, “HACKED, I HAVE ALL CUSTOMER DATA. EVALY STAFF …

    Read More »