Strap on MOVEit Transfer users – it looks like hackers are preparing for another mass exploitation campaign.

Strap on MOVEit Transfer users – it looks like hackers are preparing for another mass exploitation campaign.

A significant surge in scanning activity targeting Progress MOVEit Transfer systems has been observed since late May 2025, indicating heightened threats and potential exploitation campaigns. Threat intelligence firm GreyNoise reported a dramatic spike beginning May 27, 2025, when scanning activity jumped from fewer than 10 unique IP addresses per day to over 100, followed by 319 IPs on May 28. Daily scanning volumes have since remained elevated at 200–300 IPs, a stark deviation from baseline activity.
Central Kentucky Radiology (CKR) notifies 167,000 people that there personal information was compromised.

Central Kentucky Radiology (CKR) notifies 167,000 people that there personal information was compromised.

Central Kentucky Radiology (CKR), a radiology services provider based in Lexington, Kentucky, is notifying approximately 167,000 individuals that their personal information was compromised following a data breach that occurred between October 16 and October 18, 2024. The organization discovered the breach after detecting unusual activity and a disruption in its computer network on October 18, 2024.
Vulnerability in Open VSX Registry could allow attackers to gain full control over the entire marketplace.

Vulnerability in Open VSX Registry could allow attackers to gain full control over the entire marketplace.

Cybersecurity researchers from Koi Security have disclosed a critical vulnerability in the Open VSX Registry, an open-source alternative to the Visual Studio Marketplace for VS Code extensions. This vulnerability, if successfully exploited, could have allowed attackers to gain full control over the entire marketplace, enabling them to publish malicious updates to every extension hosted on Open VSX. This would have posed a severe supply chain risk, potentially compromising millions of developer machines, as nearly every time an extension is installed or updated, the action is routed through Open VSX.
Faux hacker pleads guilty to hacking organizations to promote his “bold rather than sophisticated” security services.

Faux hacker pleads guilty to hacking organizations to promote his “bold rather than sophisticated” security services.

Nicholas Michael Kloster, a 32-year-old man from Kansas City, Missouri, was charged last year with unauthorized access to protected computers and obtaining information, as well as causing reckless damage during unauthorized access. His case has drawn attention due to the bold and unusual methods he used to access the systems of at least three organizations, primarily as a way to promote his own cybersecurity services.
Computer hacker wearing a dunce cap hat

Those crazy kids. Columbia University cyberattack persists, prompting widespread outages and funny pictures of Trump.

Columbia University has recently experienced significant disruptions to its IT systems, which began in the early morning hours of Tuesday, June 25, 2025, and continued into Wednesday. The incident is suspected to be a cyberattack, with widespread outages affecting key university services, including the UNI login authentication system, LionMail email service, and the CourseWorks online assignment platform.
After the CrowdStrike fiasco, Microsoft is making changes to move antivirus protection out of the system kernel.

After the CrowdStrike fiasco, Microsoft is making changes to move antivirus protection out of the system kernel.

Why, oh why, would you ever allow someone else's code in your kernel, making yourself dependent on the stability of an outsider's system? But that's what Microsoft did - and they paid the price. But they're about to fix that. Microsoft is making significant changes to how security software, including antivirus and endpoint protection solutions, interacts with the Windows operating system. Following the July 2024 CrowdStrike incident—where a faulty update caused widespread system outages by affecting the Windows kernel—Microsoft has committed to reducing the risks associated with third-party security software running at the kernel level.
Sneaky phishing campaign uses Microsoft’s Direct Send to make emails look like they came from within the organization.

Sneaky phishing campaign uses Microsoft’s Direct Send to make emails look like they came from within the organization.

Microsoft 365 ‘Direct Send’ is a feature designed to allow devices and applications—such as printers, scanners, or cloud services—to send emails directly to internal recipients within an organization without requiring traditional email authentication like usernames and passwords. While this is convenient for legitimate business needs, it has also become a significant security risk via an ongoing phishing campaign.
Cisco addresses two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) platforms.

Cisco addresses two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) platforms.

Cisco has recently addressed two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) platforms, tracked as CVE-2025-20281 and CVE-2025-20282. Both vulnerabilities allow unauthenticated, remote attackers to execute arbitrary code with root privileges, posing a severe risk to affected systems.