GreedyBear Steals $1 M in Crypto Using 150+ Malicious Firefox Wallet Extensions: A campaign codenamed GreedyBear exploited over 150 malicious extensions in the Firefox marketplace, disguised as popular crypto wallets (e.g., MetaMask, Exodus). By using a tactic called “Extension Hollowing”, attackers first built credibility by uploading benign extensions, then weaponized them later—resulting in the theft of over $1 million in cryptocurrency.
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems: Two critical remote code execution (RCE) vulnerabilities (CVE‑2025‑54948 and CVE‑2025‑54987, CVSS 9.4) in Trend Micro Apex One Management Console—on-premise—are being actively exploited in the wild. A temporary fix tool is available while a formal patch is expected mid‑August. Mitigation guidance includes restricting remote access and patching promptly.
Storm‑2603 Deploys DNS‑Controlled Backdoor in Warlock and LockBit Ransomware Attacks: The threat actor Storm‑2603 has exploited SharePoint vulnerabilities, deploying a DNS‑based backdoor (AK47DNS) and HTTP variant (AK47HTTP) to deliver both Warlock and LockBit ransomware. Using tools like PsExec and masscan, it executed a sophisticated hybrid of APT and criminal tactics targeting Latin American and APAC organizations since early 2025.
Unlock access to the largest independent learning library in Tech for FREE!
Get unlimited access to 7500+ expert-authored eBooks and video courses covering every tech area you can think of.
Renews at €18.99/month. Cancel anytime
CL‑STA‑0969 Installs Covert Malware in Telecom Networks During 10‑Month Espionage Campaign: A state-sponsored threat cluster, CL‑STA‑0969 (linked to Liminal Panda), infiltrated Southeast Asian telecommunication infrastructure for nearly 10 months. Though no data was stolen, victims were implanted with various advanced tools (e.g., AuthDoor, Cordscan, EchoBackdoor, ChronosRAT) for persistent covert access and intelligence gathering.
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps: A flaw named MCPoison (CVE‑2025‑54136, CVSS 7.2) in the AI-powered Cursor code editor could allow remote code execution (RCE). An attacker can initially gain code trust through a benign Model Context Protocol (MCP) configuration, then swap it for malicious content—executed silently when the user opens Cursor. Fixed in version 1.3 with stricter approvals.
Akira Ransomware Exploits SonicWall VPNs in Likely Zero‑Day Attack on Fully‑Patched Devices: The Akira ransomware group has been leveraging SonicWall SSL VPNs, possibly exploiting a zero-day vulnerability, even on fully patched devices. Attacks began mid‑July, and organizations are advised to disable VPN access temporarily, enforce multi-factor authentication (MFA), audit user accounts, and bolster password hygiene.