Security Affairs newsletter Round 543 by Pierluigi Paganini – INTERNATIONAL EDITION

Boletim informativo de Assuntos de Segurança Rodada 536 por Pierluigi Paganini – EDIÇÃO INTERNACIONAL

Security Affairs newsletter Round 543 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box.

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

International Press – Newsletter

Cybercrime

Threat Actors Spoofing the FBI IC3 Website for Possible Malicious Activity

Hacking Activities of Pro-Russian Cyber Crime Group Targeting Korean Companies

Canada dismantles TradeOgre exchange, seizes $40 million in crypto

Scattered Spider Suspect Arrested in US

ShadowV2: An emerging DDoS for hire botnet

Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms

Volvo Group Employee Data Stolen in Ransomware Attack

USD 439 million recovered in global financial crime operation

Eurojust coordinates action to halt cryptocurrency fraud of over 100 million euros across Europe

European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

260 suspected scammers arrested in pan-African cybercrime operation

Ransomware attack on Ohio county impacts over 45,000 residents, employees

Malware

Brewing Trouble — Dissecting a macOS Malware Campaign

Large-Scale Attack Targeting Macs via GitHub Pages Impersonating Companies to Attempt to Deliver Stealer Malware

Malware Analysis Report RayInitiator & LINE VIPER

XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory

Bearlyfy: The Evolution of a New Ransomware Group and Its Connection to PhantomCore

Updated BO Team Grouping Tools

Hacking

ComicForm, start: F6 analysts have studied the phishing campaigns of a new attacker

Project Rain:L1TF

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver – CVE-2025-53149

Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack

CISA Shares Lessons Learned from an Incident Response Engagement

Cisco warns of IOS zero-day vulnerability exploited in attacks

IMDS Abused: Hunting Rare Behaviors to Uncover Exploits

Cisco Event Response: Continued Attacks Against Cisco Firewalls

Technical Analysis – CVE-2025-10035

It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) – Part 2

ForcedLeak: AI Agent risks exposed in Salesforce AgentForce

SVG Phishing hits Ukraine with Amatera Stealer, PureMiner

Intelligence and Information Warfare

Mapping the Infrastructure and Malware Ecosystem of MuddyWater

Inside Palantir: The Secretive Tech Company Helping the US Government Build a Massive Web of Surveillance

U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area

Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.

ICE unit signs new $3M contract for phone-hacking tech

Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign

Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers

Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors

NCSC warns of persistent malware campaign targeting Cisco devices

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception

RedNovember Targets Government, Defense, and Technology Organizations

Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza

Cybersecurity

European airports disruption due to ransomware — EU agency

Auto giant Stellantis investigating data breach following ‘unauthorized access’

Statement on AI and Cybersecurity

European airports still dealing with disruptions days after ransomware attack

SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw

CISA: ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices

Cyberattack on Jaguar Land Rover threatens to hit British economic growth

Statement from the Canadian Centre for Cyber Security on malware targeting global organizations through Cisco Systems

Brits warned as illegal robo-callers with offshored call centers fined half a million

Gcore Radar Attack Trends Q1‑Q2 2025

Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts

Follow me on Twitter:@securityaffairsandFacebookandMastodon

PierluigiPaganini

(SecurityAffairs–hacking,newsletter)



azaeo.com – datalake

File fishes formats available in:

AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.