Intruder unveils GregAI, an AI-powered security analyst to help organizations respond to security threats.

Intruder unveils GregAI, an AI-powered security analyst to help organizations respond to security threats.

Cybersecurity vendor Intruder has announced the launch of GregAI, an advanced AI-powered security analyst designed to revolutionize how organizations manage and respond to security threats. GregAI seamlessly integrates with Intruder’s renowned exposure management platform, delivering contextual, real-time security workflow management tailored to each customer’s unique environment.
CISA issues urgent alert for several actively exploited vulnerabilities targeting Cisco Identity Services Engine.

CISA issues urgent alert for several actively exploited vulnerabilities targeting Cisco Identity Services Engine.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released an urgent warning concerning several actively exploited, critical vulnerabilities affecting Cisco’s Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC). These security flaws have been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog following reports of real-world exploitation, putting organizations at significant risk if not promptly addressed.
Gunra ransomware group releases a sophisticated Linux variant engineered for performance and multithreaded encrypted channels.

Gunra ransomware group releases a sophisticated Linux variant engineered for performance and multithreaded encrypted channels.

The cybercrime landscape has taken a concerning turn with the emergence of a powerful Linux variant released by the Gunra Ransomware Group, a threat actor increasingly active on the global stage. This new development marks a strategic evolution in ransomware operations, targeting organizations across diverse industries and geographies.
FBI seizes over $2.4 million in crypto linked to the Chaos ransomware group.

FBI seizes over $2.4 million in crypto linked to the Chaos ransomware group.

The Federal Bureau of Investigation (FBI) has seized more than $2.4 million in cryptocurrency believed to be linked to the notorious Chaos ransomware gang. The operation, executed by agents in the Dallas field office on April 15, 2025, resulted in the confiscation of approximately 20.2 Bitcoin (BTC). The seizure was publicly announced on July 28, 2025.
The UK’s Online Safety Act was broken on the first day when a user found he could bypass Discord’s age verification using Death Stranding’s “photo mode” hack.

The UK’s Online Safety Act was broken on the first day when a user found he could bypass Discord’s age verification using Death Stranding’s “photo mode” hack.

On July 25, 2025, an X (formerly known as Twitter) user named Dany Sterkhov publicly revealed a method to circumvent Discord’s newly implemented age verification system in the United Kingdom, exploiting the photo mode feature in the video game Death Stranding. Sterkhov’s post included a demonstration on X, showing how Discord’s verification could be bypassed by utilizing a virtual “selfie” of the game’s protagonist, Sam Porter Bridges, in place of a real user’s image.
Sploitlight macOS security flaw disclosed by Microsoft Threat Intelligence team because… of course.

Sploitlight macOS security flaw disclosed by Microsoft Threat Intelligence team because… of course.

A serious security flaw in macOS, identified as CVE-2025-31199 and dubbed “Sploitlight,” has been disclosed by Microsoft’s Threat Intelligence team. This vulnerability, now patched by Apple, targeted the Spotlight search engine’s plugin system and exposed sensitive user data, including information cached by the latest Apple Intelligence features.
Hackers penetrate Toptal’s GitHub account and leverage their privileged access to inject malicious code into the npm registry.

Hackers penetrate Toptal’s GitHub account and leverage their privileged access to inject malicious code into the npm registry.

In July 2025, prominent freelance talent platform Toptal grappled with a significant software supply chain breach after unknown threat actors penetrated its GitHub organization account. The repercussions of the attack extended far beyond source code exposure, as adversaries leveraged their privileged access to inject malicious components into the open-source ecosystem via the npm registry.
Researchers Uncover Major Online Counterfeit Currency Operation in India.

Researchers Uncover Major Online Counterfeit Currency Operation in India.

Cybersecurity researchers at CloudSEK’s STRIKE team have revealed the existence of a large-scale fake currency operation exploiting digital platforms to circulate counterfeit Indian banknotes. The operation, running openly on channels such as Facebook and Instagram, is estimated to have moved fake currency worth over ₹17.5 crore (approximately $2 million) between December 2024 and June 2025.