TAAUS Top Ten - May 2025
- gregwinterton5
- Jun 2
- 2 min read
There is never a dull moment in the managed information technology and cybersecurity space. Here is our TAAUS Top Ten for May 2025 – as always, be vigilant!
- Bleeping Computer
Those joining from unsupported platforms will be automatically placed in audio-only mode to protect shared content. The company plans to start rolling out this new Teams feature to Android, desktop, iOS, and web users worldwide in July 2025.
- TechRadar
Hackers use blob URIs to hide phishing pages inside the browser memory.
- The Hacker News
A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors to target critical infrastructure networks.
- ZDNET
Cybersecurity researcher Jeremiah Fowler revealed his discovery of a massive online database containing more than 184 million unique account credentials.
- TechCrunch
The company said in a filing with Maine’s attorney general that the breach, dating back to December 25, 2024, allowed a hacker to obtain consumers’ sensitive personal data from a third-party platform used by the company for software development.
- POLITICO
Cybersecurity firms say that the intricate scam to amass funding for North Korea’s weapons program is happening “on a scale we haven’t seen before”.
- HACKREAD
A newly emerged threat actor, going by the alias “Often9,” has posted on a prominent cybercrime and database trading forum, claiming to possess 428 million unique TikTok user records.
- Infosecurity Magazine
The provisions, outlined in Australia’s Cyber Security Act 2024, also apply to private companies that operate critical infrastructure assets in the country.
- Bleeping Computer
The Microsoft Authenticator app is now issuing notifications warning that the password autofill feature is being deprecated in July, suggesting users move to Microsoft Edge instead.
- The Hacker News
A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software.
Comments