<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 7/21/2025

SHARE

Breaches

Alaska Airlines grounded itself due to mysterious IT problem

US carrier Alaska Airlines has grounded its fleet due to an unspecified IT issue. At the time of writing, the airline's website includes a banner that reads: "We are experiencing issues with our IT systems. We apologize for the inconvenience and are working to resolve the issues." The carrier is a little more verbose on social media, where it's stated "Alaska Airlines is experiencing an IT outage affecting operations. A temporary ground stop is in place. We apologize for the inconvenience." READ MORE...


750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service

The Alcohol & Drug Testing Service (TADTS) is notifying roughly 750,000 people that their personal information was compromised in a July 2024 data breach. TADTS is based in Texas and was until recently known as the Texas Alcohol and Drug Testing Service. It provides workplace and individual alcohol and drug testing services in Texas and other states. The incident, TADTS says, was identified on July 9, 2024, and involved unauthorized access to and the theft of data maintained in its systems. READ MORE...


Marketing, Law Firms Say Data Breaches Impact Over 200,000 People

Marketing software and services company Cierant Corporation and law firm Zumpano Patricios have independently disclosed data breaches, each impacting more than 200,000 individuals. What the Cierant and Zumpano Patricios incidents have in common is that the number of impacted people was brought to light in recent days by the healthcare data breach tracker maintained by the US Department of Health and Human Services (HHS). READ MORE...

Hacking

Europol targets Kremlin-backed cybercrime gang NoName057(16)

A pro-Kremlin cybercrime network has been taken offline after an international law enforcement operation disrupted over 100 of its servers, detained two gang members, and issued arrest warrants for seven more. The hacking group NoName057(16) has been operating since 2022, launching cyber attacks on government organisations, media bodies, critical infrastructure, and private companies in a seeming attempt to silence voices that the group considers anti-Russian. READ MORE...


'PoisonSeed' Attacker Skates Around FIDO Keys

A threat actor known as "PoisonSeed" was credited with a novel attack technique that is able to bypass FIDO-based protections in an organization. That's according to a report this week from MDR vendor Expel, titled "PoisonSeed bypassing FIDO keys to 'fetch' user accounts." FIDO, or Fast Identity Online, refers to a technology-agnostic set of specifications for authentication. The technology, which was originally developed by the FIDO Alliance, is considered a gold standard in security. READ MORE...

Malware

New Phobos and 8base ransomware decryptor recover files for free

The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with BleepingComputer confirming that it successfully decrypts files. Phobos is a ransomware-as-a-service operation that launched in December 2018, enabling other threat actors to join as affiliates and utilize their encryption tool in attacks. In exchange, any ransom payments were split between the affiliate and the operators. READ MORE...

Information Security

Nearly 2,000 MCP Servers Possess No Security Whatsoever

Approximately all of the nearly 2,000 Model Context Protocol (MCP) servers exposed to the Web today are totally bereft of authentication or access controls. Every technology experiences awkward growing pains when it's first released, particularly when it comes to cybersecurity. That's especially true of artificial intelligence (AI), and most emblematic of AI's rush to adoption before security is the MCP server. MCP servers conveniently allow users to connect their AI models to data sources. READ MORE...

Exploits/Vulnerabilities

Microsoft SharePoint servers under attack via zero-day vulnerability (CVE-2025-53770)

Attackers are exploiting a zero-day variant (CVE-2025-53770) of a SharePoint remote code execution vulnerability (CVE-2025-49706) that Microsoft patched earlier this month, the company has confirmed on Saturday. CVE-2025-53770 is being leveraged to place a backdoor on vulnerable on-premises SharePoint Servers and to grab the systems' security keys, allowing the attackers full takeover of the machines. READ MORE...


Over 1,000 CrushFTP servers exposed to ongoing hijack attacks

Over 1,000 CrushFTP instances currently exposed online are vulnerable to hijack attacks that exploit a critical security bug, providing admin access to the web interface. The security vulnerability (CVE-2025-54309) is due to mishandled AS2 validation and impacts all CrushFTP versions below 10.8.5 and 11.3.4_23. The vendor tagged the flaw as actively exploited in the wild on July 19th, noting that attacks may have begun earlier, although it has yet to find evidence to confirm this. READ MORE...

On This Date

  • ...in 1911, Canadian philosopher and media theorist Marshall McLuhan, whose work prefigured the arrival of the modern Internet, is born in Edmonton, Alberta.
  • ...in 1951, actor and comedian Robin Williams is born in Chicago, IL.
  • ...in 1969, astronaut Neil Armstrong becomes the first person to walk on Earth's Moon, followed 19 minutes later by Edwin "Buzz" Aldrin.
  • ...in 2011, the Space Shuttle Atlantis (STS-135) lands at Kennedy Space Center, completing the final mission of NASA's Space Shuttle program.