Skip to content
June 2025 Page 20

June 2025

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Jun 24, 2025Ravie LakshmananCloud Security / Cryptojacking Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. “Attackers are exploiting misconfigured Docker APIs… 

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

Jun 24, 2025Ravie LakshmananData Protection / Mobile Security The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios.… 

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Jun 24, 2025Ravie LakshmananMalware / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages… 

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

Jun 24, 2025Ravie LakshmananCyber Espionage / Chinese Hackers The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt…