The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Date Archives July 2025
AI-forged panda images hide persistent cryptomining malware ‘Koske’
A new malware strain named ‘Koske’ is delivering crypto-mining payloads through dropper files posing as benign panda pictures. According to Aqua Nautilus,…
Schwarzmarkthändler wollen mit Bots an Tickets kommen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?quality=50&strip=all 4000w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=2048%2C1153&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2161920885.jpg?resize=444%2C250&quality=50&strip=all 444w”…
LUP-Kliniken: Patientendaten nach Cyberangriff im Darknet entdeckt
Bei dem Cyberangriff auf die LUP-Kliniken sind auch Patientendaten abgeflossen. khunkornStudio – shutterstock.com Im Februar 2025 wurden die LUP-Kliniken in Hagenow und…
The books shaping today’s cybersecurity leaders
From strategy and psychology to history and decision-making, these are the books CISOs recommend to sharpen your thinking, influence your leadership style,…
Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung bewältigen. Foto: Dapitart – shutterstock.com Die…
Supply chain attack compromises npm packages to spread backdoor malware
In a newly discovered supply chain attack, attackers last week targeted a range of npm-hosted JavaScript type testing utilities, several of which…
Microsoft’s incomplete SharePoint patch led to global exploits by China-linked hackers
A July 8 patch for the SharePoint Server zero-day flaw, which resulted in a global attack on nearly 100 organizations over the…
Hacker inserts destructive code in Amazon Q as update goes live
A hacker managed to insert destructive system commands into a version of Amazon’s AI-powered coding assistant, Q, which was later distributed to…
5 challenges CISOs face in using threat intel effectively
The use of threat intelligence has been standard for CISOs for years, with security chiefs recognizing that the additional data about the…