• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Screen Connect
Support
Customer Portal
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Quadient
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Sage Supply Chain Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
      • Industries
        • Financial Services
        • Healthcare
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

July 2025 Cybersecurity News Recap

July 24, 2025 by Hector

Home » Cybersecurity » July 2025 Cybersecurity News Recap

Wooden letter blocks spelling "JULY 2025" arranged in two rows on a neutral background.

The month of July in 2025 saw many new cybersecurity developments that will have serious implications for businesses across the U.S. This recap by SWK Technologies features some of the top stories among these incidents, including multiple serious CVEs (Common Vulnerabilities and Exposures), major warnings from cyber agencies and researchers, and more news that could impact your business’s cyber defense needs.

Here are SWK’s top cybersecurity news stories for July 2025:

Microsoft SharePoint Vulnerability Exploited by Hackers

Microsoft released patches for two severe zero-day vulnerabilities in its SharePoint platform, which have already been exploited by different threat actors throughout July 2025. There were over 75 confirmed compromises as of this writing that spanned across different banks, universities, hospitals, corporate enterprises and public agencies throughout North America and Europe. The vulnerabilities, scoring 9.8 and 7.1 on the CVSS scale respectively, enable unauthenticated remote code execution (RCE) and administrative access to Microsoft SharePoint Server environments.

Multiple cybersecurity firms and even CISA (the U.S. Cybersecurity and Infrastructure Security Agency) have classified these CVEs as especially urgent and have called on everyone potentially affected to patch their Microsoft systems immediately. SharePoint is central to managing files across Microsoft 365 environments, meaning that if a hacker was able to gain backdoor access they would potentially be able to interact with all of the data stored by your business management applications from Word to Teams.

Attacks leveraging this exploit have been confirmed since at least earlier in the month, with proof-of-execution in several of these that have been specifically tailored to break past SharePoint’s built-in security measures. Microsoft has already addressed these exploits in their latest Patch Tuesday round of updates, but it is critical that users update their systems ASAP.

Ransomware Group Shuts Down IT Supplier Ingram Micro

Ingram Micro, an IT solutions distributor, was targeted by the ransomware group, SafePay, between July 3 to July 9 and forced to shut down multiple systems and operations to isolate the attack. The company told several employees to work from home while they worked to restore their data and resume business processes, with experts estimating losses of up to $136 million per day during the shutdown.

Ingram announced on Saturday, July 5 that it had identified a ransomware infection within their internal systems; the SafePay group claimed responsibility in a ransom note obtained by BleepingComputer, who reported that the attack was likely preceded by compromising Ingram’s VPN platform. The hackers initially used “password spraying” attacks to collect credentials for the VPN instance and leveraged these to break in remotely, exfiltrating data directly from Ingram’s systems.

SafePay is proving to be a unique player in cybercrime for several reasons, from emerging suddenly in 2024 to pulling off several high-profile cyber attacks such as this one in a relatively short time. Most notable, however, is that the group claims not to operate as a typical RaaS (Ransomware as a Service) model where their malware would be licensed out to others – they work on their campaigns directly in a closed group of a few dozen individuals. They also focus more on capturing and extracting data directly, as they performed against Ingram, creating more pressure for victims than by simply encrypting files.

CISA Warns of Citrix NetScaler Flaw Exploit Attacks

CISA joined several security researchers and other experts in warning the public about a major flaw present in Citrix NetScaler that has already seen a significant volume of exploitation in the wild by bad actors. Dubbed “Citrix Bleed 2” due to its similarity to an earlier bug in the same application, it allows hackers to bypass authentication protocols and gain direct access to connected devices, even potentially with MFA (multifactor authentication) enabled. Though Citrix seemed to initially deny the flaw was legitimate, it has been found that it has already been exploited since at least June 2025 and several users have likely been compromised already.

Application Delivery Controllers (ADC) such as NetScaler typically sit at the perimeter of organizational networks, serving as the primary gateway for remote workers accessing company resources through VPN connections, virtual desktop environments and web-based apps. When employees work from home or travel, their connection to company systems almost invariably passes through Citrix NetScaler, making these devices a single point of failure for security. This flaw allows attackers to exploit how the ADC processes authentication requests, leveraging a memory leak to collect token data.

Citrix’s initial response to both bugs has caused controversy, as they were initially dismissive of the extent of the risk or applicability of the potential exploitation. However, the alarm bells rung by private firms and CISA has brought attention to the severity of Citrix Bleed 2, with widespread attacks already seen in the wild confirming that it is being actively targeted by hackers.

Interlock Ransomware Targets Healthcare

Multiple government agencies issued a joint advisory warning of an observed spike in attacks using Interlock ransomware, including against targets in healthcare and other critical infrastructure industries. Though this strain is relatively young, only emerging in late 2024, it has already proven to be a serious danger for many unsuspecting victims, prompting the FBI, CISA and even the Department of Health and Human Services to take the extra step to warn the public.

As seen with the case of Kettering Health in May 2025, the Interlock group’s tactics can be particularly devastating for organizations with multiple connected medical facilities, allowing infections to spread across different systems and forcing staff to isolate resources to prioritize critical care in the event of a total collapse. The gang also uses many uncommon methods to infect victims’ networks, such as “drive-by downloads” from compromised websites and fake update messages for browsers and other applications, making it even harder to catch an initial attack.

Though the FBI and CISA emphasize that Interlock goes after targets of opportunity most often, rising global tensions from June 2025 may be contributing to this spike given the focus on infrastructure industries like healthcare. Several nation-states work closely with cybercriminal groups to achieve political objectives and some will even outsource cyberwarfare goals to these independent actors.

Discover More Cybersecurity Developments with SWK

The cyber incidents seen in July 2025 show how critical it is to stay on top of the continuous security developments that emerge every month in the increasingly digital world. The expert team at SWK Technologies actively monitors these emerging threats and stays ahead of the evolving risk landscape – partner with SWK today to leverage our award-winning managed IT and security services, and ensure your business is prepared to handle whatever challenges emerge.

Contact SWK here to learn more about current cybersecurity developments and what your business needs to do to maintain protection against sophisticated cyber threats.

Contact Us

Category: Cybersecurity, Blog

Sidebar

Recent Posts

  • July 2025 Cybersecurity News Recap
  • ERP vs CRM: Software Differences
  • The Cybersecurity Checklist for Financial Service Firms
  • Closing the Door on Outdated ERP and Opening to Growth
  • SWK Technologies Ranks on Accounting Today VAR 100 for 2025
  • Why You Should Host Sage 100 Contractor in the Cloud
  • Acumatica Accounts Payable Training Guide

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Wooden letter blocks spelling "JULY 2025" arranged in two rows on a neutral background.

July 2025 Cybersecurity News Recap

Read moreJuly 2025 Cybersecurity News Recap
Professional using dual monitor setup to work with business software applications in modern office environment with natural lighting and plants.

ERP vs CRM: Software Differences

Read moreERP vs CRM: Software Differences
SWK Technologies Financial Services Cybersecurity Preparedness Checklist workbook open to Section 1 data risk assessment page with checkboxes and form fields

The Cybersecurity Checklist for Financial Service Firms

Read moreThe Cybersecurity Checklist for Financial Service Firms

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand