<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 7/31/2025

SHARE

Breaches

What the Coinbase Breach Says About Insider Risk

When your digital vault is compromised, the fallout isn't just financial - it cuts to the foundation of trust. That is the reality that Coinbase, one of the world's largest cryptocurrency exchanges, is facing in the wake of a data breach that reportedly led to losses of up to $400 million and exposed almost 70,000 customers' personal information. This breach also sparked serious questions about how well companies are managing data governance, internal security controls, and insider risk. READ MORE...


ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH

A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters extortion group, which has been using voice phishing attacks to steal data from Salesforce CRM instances. In June, Google's Threat Intelligence Group (GTIG) warned that threat actors tracked as UNC6040 were targeting Salesforce customers in social engineering attacks. READ MORE...

Hacking

Scammers Unleash Flood of Slick Online Gaming Sites

Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here's a closer look at the social engineering tactics and remarkable traits of this sprawling network of more than 1,200 scam sites. The scam begins with deceptive ads posted on social media. READ MORE...


In search of riches, hackers plant 4G-enabled Raspberry Pi in bank network

Hackers planted a Raspberry Pi equipped with a 4G modem in the network of an unnamed bank in an attempt to siphon money out of the financial institution's ATM system, researchers reported Wednesday. The researchers with security firm Group-IB said the "unprecedented tactic allowed the attackers to bypass perimeter defenses entirely." The hackers combined the physical intrusion with remote access malware that used another novel technique to conceal itself. READ MORE...

Malware

Koreans Hacked, Blackmailed by 250+ Fake Mobile Apps

Hackers have concealed spyware in more than 250 seemingly harmless Android and iOS apps in Korea. The malicious apps are of all shapes and sizes: social media, dating, cloud file services, even car services. They mimic brands with innocuous names and cute and professional-looking logos. They sport plenty of five-star reviews. In other words, they're quite easy to mistake as legitimate, until after you've waived all your personal data protections. READ MORE...


Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data

Browser security firm LayerX has disclosed a new attack method that works against popular gen-AI tools. The attack involves browser extensions and it can be used for covert data exfiltration. The method, named Man-in-the-Prompt, has been tested against several highly popular large language models (LLMs), including ChatGPT, Gemini, Copilot, Claude and DeepSeek. Any browser extension can access these AI tools and inject prompts instructing them to provide sensitive data and exfiltrate it. READ MORE...

Information Security

That seemingly innocent text is probably a scam

Many of us have received texts like these. Often super short, some flirty, some with a business tone, or sometimes just a simple 'hello.' You don't know the sender, and they look like an honest mistake. But they're not. All the messages are carefully crafted to seem plausible-so you don't immediately feel suspicious-and short-to trigger your curiosity. The intention of these messages are to get you to be confused enough that you will reply, perhaps by saying they have the wrong number. READ MORE...


Lethal Cambodia-Thailand border clash linked to cyber-scam slave camps

Thai and Cambodian tensions relating to issues including cybersecurity concerns boiled over into a kinetic skirmish at the border last week. The conflict started largely as an extension of a decades-old dispute over access to an ancient Hindu temple located a couple of hundred meters on the Cambodian side of the border. Tensions at the temple were already high. In May, Thai and Cambodian troops exchanged fire across the border near the site. One Cambodian soldier died as a result. READ MORE...

Exploits/Vulnerabilities

China claims Nvidia built backdoor into H20 chip designed for Chinese market

Beijing has summoned Nvidia over alleged security issues with its chips, in a blow to the US company's push to revive sales in the country after Washington granted approval for the export of a made-for-China chip. China's cyber regulator on Thursday said it had held a meeting with Nvidia over what it called "serious security issues" with the company's artificial intelligence chips. It said US AI experts had "revealed that Nvidia's computing chips have location tracking." READ MORE...

On This Date

  • ...in 1790, the first U.S. patent is issued to inventor Samuel Hopkins for a unique potash production process.
  • ...in 1932, 6'9" actor Ted Cassidy, best known as Lurch from "The Addams Family", is born in Pittsburgh, PA.
  • ...in 1964 Ranger 7, an unmanned U.S. lunar probe, takes the first close-up images of the moon before impacting with the lunar surface.
  • ...in 1990, Nolan Ryan wins the 300th game of his career, throwing 7 2/3 innings with 8 strikeouts to lead his Texas Rangers to an 11-3 victory over the Milwaukee Brewers.