Yet another health care provider (St. Joseph) breached on Oracle Health platform.

Yet another health care provider (St. Joseph) breached on Oracle Health platform.

St. Joseph, Missouri-based Mosaic Life Care has confirmed it was affected by a data breach originating at its electronic health record (EHR) vendor, Oracle Health (formerly Cerner). The breach was discovered after Mosaic Life Care was contacted by an unknown third party earlier in 2025, who claimed to possess patient information. Mosaic Life Care verified these claims on April 29, 2025, and by May 2, 2025, determined that the source of the compromised data was Oracle Health.
Newly discovered FileFix attach variant exploits how browsers handle saved HTML pages to execute malicious JavaScript.

Newly discovered FileFix attach variant exploits how browsers handle saved HTML pages to execute malicious JavaScript.

A newly discovered FileFix attack variant exploits how browsers handle saved HTML pages to execute malicious JScript while evading Windows’ Mark of the Web (MoTW) security alerts. This technique, detailed by security researcher mr.d0x, bypasses critical security warnings by manipulating file-saving behaviors.
Researchers say the lack of a permission model in IDEs like Visual Studio Code lets attackers bypass verification and install rogue extensions.

Researchers say the lack of a permission model in IDEs like Visual Studio Code lets attackers bypass verification and install rogue extensions.

A newly discovered security flaw in integrated development environments (IDEs) like Visual Studio Code allows malicious extensions to bypass verified status checks, enabling attackers to execute arbitrary code on developers’ machines. This vulnerability stems from weaknesses in the extension verification process, where attackers can create rogue extensions that appear verified while containing harmful functionality.
Doppelgängers? Proofpoint researchers identify significant overlaps between threat actors TA829 and UNK_GreenSec.

Doppelgängers? Proofpoint researchers identify significant overlaps between threat actors TA829 and UNK_GreenSec.

Cybersecurity researchers have identified significant tactical overlaps between the threat actors behind the RomCom RAT (tracked as TA829) and a newly observed cluster distributing the TransferLoader malware (tracked as UNK_GreenSec). These groups share infrastructure, delivery methods, and phishing tactics, blurring the lines between cybercrime and state-aligned espionage.
US levies sanctions on Russian bulletproof hosting service, Aeza Group, for its role in hosting ransomware, malware, and infostealers.

US levies sanctions on Russian bulletproof hosting service, Aeza Group, for its role in hosting ransomware, malware, and infostealers.

The U.S. Department of the Treasury has imposed sanctions on Aeza Group, a Russia-based bulletproof hosting provider, for allegedly supporting a wide range of cybercriminal activities, including ransomware attacks, infostealer operations, darknet drug markets, and Russian disinformation campaigns.
AT&T introduces “Wireless Lock” to block SIM swap attacks.

AT&T introduces “Wireless Lock” to block SIM swap attacks.

AT&T has introduced a new security feature called Wireless Account Lock (also referred to as “Wireless Lock” or “Account Lock”) to protect customers from SIM swap attacks—a type of fraud where attackers transfer a victim’s phone number to a SIM card under their control to intercept calls, texts, and two-factor authentication codes. This feature is now available to all AT&T customers, including both individual and business accounts, after a phased rollout that began earlier in the year.
Computer hacker holding a cash money bag

French police bust ring that used SIM-swapping to steal over $1 million from Société Générale bank clients.

French police have arrested a business student interning at Société Générale who is accused of helping a SIM-swapping fraud ring steal over €1 million (approximately $1.15 million) from 50 clients of the bank. The intern, reportedly a Master’s student at a business school, was working at the bank’s headquarters in Paris and is alleged to have abused his position to access and share sensitive customer banking information with a criminal network.