Vulnerable U logo
Vulnerable U
Sponsors
Subscribe
  • Vulnerable U
  • Topics
  • News

News

Cybersecurity and tech news articles

Mental HealthApacheMicrosoftcybercrimeMalwareChinaIranVulnerabilityLinuxAINewsIoTGovernmentHardwareAndroidRansomwareAppleRussiaNewsletterGoogledata breachGuides
cybercrimecybercrime
+1+1
Cartel Hacker Turned an FBI Agent’s Phone into a Hit List
Jul 02, 2025

Cartel Hacker Turned an FBI Agent’s Phone into a Hit List

How a single phone number, leaky telecom data, and a city-wide camera grid helped the Sinaloa cartel hunt, and reportedly kill, U.S. informants.

Newsroom
Newsroom
NewsNews
Data Brokers and the 2025 Minnesota Lawmaker Shooting
Jun 19, 2025

Data Brokers and the 2025 Minnesota Lawmaker Shooting

An inside look at Vance Boelter’s use of 11 people-search services to track and attack officials, and why weak U.S. privacy laws still leave every home address exposed.

Matt Johansen
Matt Johansen
NewsNews
+1+1
UNFI Cyberattack Halts Deliveries to Whole Foods and 30,000+ Grocery Stores
Jun 13, 2025

UNFI Cyberattack Halts Deliveries to Whole Foods and 30,000+ Grocery Stores

June 2025 breach forces UNFI to take critical systems offline, triggering order backlogs, an FBI investigation, and scrutiny of critical infrastructure.

Newsroom
Newsroom
AIAI
+2+2
Apple WWDC 2025: Every iOS 26 Security & Privacy Feature Explained
Jun 10, 2025

Apple WWDC 2025: Every iOS 26 Security & Privacy Feature Explained

Deep dive into call screening, messages filtering, on-device AI, PCC, and promised RCS encryption - what they mean for security and privacy

Matt Johansen
Matt Johansen
NewsNews
+1+1
Lockbit, laid bare: what a SQL dump tells us about the world’s most notorious ransomware-as-a-service
May 30, 2025

Lockbit, laid bare: what a SQL dump tells us about the world’s most notorious ransomware-as-a-service

Analysis of leaked builds, chat logs and wallet tables uncovers how new affiliates fuel global ransomware attacks.

Newsroom
Newsroom
MalwareMalware
+1+1
Booking.com? more like Booking.exe: inside a ClickFix email that drops malware
May 30, 2025

Booking.com? more like Booking.exe: inside a ClickFix email that drops malware

How attackers use clipboard PowerShell stagers and brand-spoofed links to bypass macros and drop a .NET RAT.

Newsroom
Newsroom
cybercrimecybercrime
+1+1
How Funnull Became the Backbone of U.S. Crypto Pig-Butchering Scams
May 30, 2025

How Funnull Became the Backbone of U.S. Crypto Pig-Butchering Scams

Treasury’s May 29 action freezes Funnull’s IP pools and prefab scam kits. An estimated $200 million in U.S. losses tied to this turnkey infrastructure provider.

Matt Johansen
Matt Johansen
NewsNews
+1+1
ConnectWise Breach - ScreenConnect Hit by Nation State Hackers
May 30, 2025

ConnectWise Breach - ScreenConnect Hit by Nation State Hackers

Analysis of the May 28 breach shows tight scope but zero transparency. Here’s what MSPs must do to validate their defenses.

Newsroom
Newsroom
MalwareMalware
+2+2
Fake AI Video Generators Deliver Rust-Based Malware via Malicious Ads
May 29, 2025

Fake AI Video Generators Deliver Rust-Based Malware via Malicious Ads

Analysis of UNC6032’s Facebook and LinkedIn ad blitz shows social-engineered ZIPs leading to multi-stage Python and DLL side-loading toolkits

Matt Johansen
Matt Johansen
MicrosoftMicrosoft
+2+2
Void Blizzard hackers raid NATO cloud tenants with Evilginx phishing
May 28, 2025

Void Blizzard hackers raid NATO cloud tenants with Evilginx phishing

The new Microsoft report links the Russia-backed group to cookie-theft proxies and mass mailbox exports across critical sectors in Europe and North America.

Matt Johansen
Matt Johansen
MicrosoftMicrosoft
+2+2
World’s Largest Infostealer Malware Disrupted: Lumma Stealer Crackdown
May 21, 2025

World’s Largest Infostealer Malware Disrupted: Lumma Stealer Crackdown

Microsoft Seizes 2,300 Lumma Stealer Domains in Global Takedown. Here's what you need to know.

Matt Johansen
Matt Johansen
NewsNews
ASUS Patches RCE Bugs in DriverHub
May 13, 2025

ASUS Patches RCE Bugs in DriverHub

The two vulnerabilities can be chained together to gain RCE

Newsroom
Newsroom
Infosec's favorite weekly newsletter for news, tools, and tips with 28,000+ CISOs, founders, change-makers, and straight up hackers.

Vulnerable U

Infosec's favorite weekly newsletter for news, tools, and tips with 28,000+ CISOs, founders, change-makers, and straight up hackers.

Home

Posts

Authors

Account

Upgrade

© 2025 Vulnerable U.

Privacy policy

Terms of use