IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Malwarebytes

A week in security (August 11 – August 17)

2025-08-18 09:08

A list of topics we covered in the week of August 11 to August 17 of 2025

This article has been indexed from Malwarebytes

Read the original article:

A week in security (August 11 – August 17)

Tags: EN Malwarebytes

Post navigation

← Cisco firewall warning, Colt Telecom cyberattack, CISA’s OT request
Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • I tested the best antivirus software for Windows: Here’s what I’d use to protect my PC August 18, 2025
  • I dialed these 14 secret codes to unlock hidden features on my Android and iPhone August 18, 2025
  • Human resources firm Workday disclosed a data breach August 18, 2025
  • Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets August 18, 2025
  • VW Offers Paid Subscription To Unlock Horsepower August 18, 2025
  • Intel Shares Jump On Report Of Possible US Government Stake August 18, 2025
  • Insta360 Challenges DJI With 360-Degree Drone August 18, 2025
  • Applied Materials Shares Plunge On Reduced China Demand August 18, 2025
  • US Court Partially Blocks Maryland Digital Tax Law August 18, 2025
  • The AI-Powered Trojan Horse Returns: How LLMs Revive Classic Cyber Threats August 18, 2025
  • The best Motorola phones of 2025: Is the $1,300 Razr Ultra worth buying? August 18, 2025
  • Plagued by Cyberattacks: Indian Healthcare Sector in Critical Condition August 18, 2025
  • Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time August 18, 2025
  • HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM August 18, 2025
  • Man Jailed for 20 Months After Compromising Millions of Accounts August 18, 2025
  • Workday Data Breach Exposes HR Records via Third-Party CRM Hack August 18, 2025
  • Here are all the GPT-5 updates OpenAI has rolled out since launch August 18, 2025
  • DoJ seizes $2.8M linked to Zeppelin Ransomware August 18, 2025
  • Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 August 18, 2025
  • Workday Reveals CRM Breach August 18, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}