Sophos Endpoint: Consistently AAA rated – Q2 2025 SE Labs Endpoint Protection Report
The secret of success is consistency!
A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts. “Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,”…
After its CEO was arrested last summer, Telegram has been increasingly sharing user data at the request of authorities. The post Telegram Shared Data of Thousands of Users After CEO’s Arrest appeared first on SecurityWeek.
Ashden Fein, Jess Gonzalez Valenzuela, Analese Bridges, John Webster Leslie, and Claire O’Rourke of Covington and Burling write: The Cybersecurity Information Sharing Act of 2015 (“CISA 2015”), which provides liability protections and other safeguards for sharing certain cybersecurity information with the U.S. federal government and private entities, was reauthorized as part of the funding bill……
Data allegedly from Manhattan Parking Group has been leaked on a hacking forum. The listing claims that the breach occurred this month (June 2025). The data fields include: Customer ID, First Name, Last Name, E-mail, Cell Phone Number, Order Number, Company Code, Garage, Date From, Time From, Date To, Time To, Vehicle Type, Options, Vehicle…
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. “UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the
Progressive Southeastern Insurance Company’s notice to consumers concerns an impostor whom they unknowingly hired, it seems: What Happened? In March 2025, we received anonymous information that a Progressive employee was working under someone else’s identity. We promptly began an internal investigation. The investigation determined that the employee had used someone else’s identity to obtain employment…