The State of Ransomware in Retail 2025
361 IT and cybersecurity leaders reveal the ransomware realities for retail businesses today.
Patch Tuesday: Adobe ships patches for more than a dozen security defects in a wide range of software products. The post Adobe: Critical Code Execution Flaws in Photoshop appeared first on SecurityWeek.
Keoni Everington reports: Two alleged Taiwanese clients of a Chinese ransomware group behind attacks on the Mackay Memorial Hospital and other targets in Taiwan have been arrested and released on bail. According to a Ministry of Justice Investigation Bureau, between February and March, the group CrazyHunter used ransomware to attack hospitals, publicly listed companies, and……
Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named “sjclark76” on May 7, 2024. The developer describes the…
Jordan Sollof reports: Pathology supplier Synnovis is contacting NHS organisations which had data stolen and published online following a major cyber attack last year. The ransomware attack on 4 June 2024, which led to a patient death, caused widespread disruption to NHS services in London including thousands of delayed appointments at King’s College Hospital NHS Foundation Trust and Guy’s……
A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. “Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution,” Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical write-up of the campaign….
Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user’s Git credentials. “Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper,” GMO Flatt Security researcher Ry0taK, who discovered the…