View as Webpage

Cyber Security Review Newsletter
Cyber Security Review Banner - new

19 August 2025 | Issue 248

TOP NEWS

Australia’s second-largest internet provider iiNet customers’ data exposed in cyber attack


Deep dive into CVE‑2025‑29824 in Windows

 

GodRAT – New RAT targeting financial institutions

 

Cisco warns of worrying major security flaw in firewall command center – patch now

 

Workday hit by data breach targeting CRM systems

 

Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824

 

UNODC: Organized crime dynamics in the context of war in Ukraine

 

UK: Thousands of Afghans, troops and civil servants may be victims of new data breach

 

Telco giant Colt suffers attack, takes systems offline

 

Canada: House of Commons hit by cyberattack from ‘threat actor’

 

Norway spy chief blames Russian hackers for hijacking dam

Cyber attack on Nigeria Customs Service disrupts clearance operations

 

Russia restricts Telegram, WhatsApp calls, citing law breaches

 

New trends in phishing and scams: How AI and social media are changing the game

 

FBI: Fictitious Law Firms Targeting Cryptocurrency Scam Victims Combine Multiple Exploitation Tactics While Offering to Recover Funds

 

Pandora cyber attack highlights growing threat to ecommerce

 

Fortinet Releases Security Advisory for Authentication Bypass Vulnerability

 

Hackers breach and expose a major North Korean spying operation

 

New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises

 

WinRAR vulnerability exploited by two different groups

 

Cyber’s Focus On Prevention Hasn’t Worked, Making Cyber Resilience Elusive    

How NATO Is Building Resilience Against Disruptive Cyber Technologies

 

Russian government hackers said to be behind US federal court filing system hack

 

U.S. Department of Justice Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations

 

WestJet says some passengers’ personal information stolen in cyberattack

 

From ClickFix to Command: A Full PowerShell Attack Chain

 

University of Western Australia suffers major data breach, staff and students locked out

 

Security flaws in a carmaker’s web portal let one hacker remotely unlock cars from anywhere

 

Massive leak of over 115 million US payment cards caused by Chinese “smishing” hackers

 

Bouygues Telecom data breach could affect millions of customers

 

Google says UNC6040 hackers stole some of its data following Salesforce breach

MAIN TOPICS

ADVANCED PERSISTENT THREAT


ARTIFICIAL INTELLIGENCE


CRITICAL INFRASTRUCTURE PROTECTION


CYBERCRIME


DDoS


MALWARE


NETWORK SECURITY

ARTICLES

THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER

HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES

KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC

By Josh Breaker-Rolfe

ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS

By Katrina Thompson

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 7193 2303 

marcom@cybersecurity-review.com

X

www.cybersecurity-review.com

© 2014-2025 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.