Top Tech Headlines for July 21, 2025
It’s another big day in tech and cybersecurity! From VPN leaks to zero-day threats and new legislation on stablecoins, we’ve rounded up the most important stories you need to know. Let’s dive into today’s must-read headlines.
Intel Shuts Down Clear Linux OS
After a decade of development, Intel has officially pulled the plug on its Clear Linux OS. Known for its performance optimization on Intel hardware, the project is now archived on GitHub. While it's a loss to the open-source community, Intel says its future focus lies elsewhere.
Ring Denies Breach Amid Suspicious Logins
Ring users raised concerns after reports of unauthorized devices logging into accounts. The company blames a backend update bug from May but insists no breach occurred. Still, users are urged to update credentials and enable two-factor authentication.
ExpressVPN Bug Exposes IPs in RDP Sessions
A newly patched ExpressVPN vulnerability allowed Remote Desktop traffic to bypass VPN encryption, leaking real IP addresses. This flaw affected only the Windows client but serves as a reminder to always update software and verify your secure tunnel status.
Veeam MFA Rollout Locks Out Users
Veeam Recovery Orchestrator introduced multi-factor authentication—unfortunately, it left some users locked out of the Web UI. The issue impacts recent versions and highlights a growing pain in security upgrades for enterprise tools.
Dior Notifies U.S. Customers of May Data Breach
Dior is formally notifying American customers about a cyber incident from May that compromised personal information. Details remain scarce, but the breach underscores the risks major brands face and the importance of monitoring account activity.
CrushFTP Admin Panels Exposed in Ongoing Attacks
Over 1,000 CrushFTP servers are vulnerable due to a critical flaw that gives attackers admin-level control. Active hijack attempts are being observed, making immediate patching an absolute must. If you're running this software, check your exposure status now.
Dell Confirms Test Lab Breach by Extortion Group
World Leaks, a rebranded extortion group, claims responsibility for breaching a Dell product test platform. While core systems weren’t affected, it’s another indicator of growing ransomware threats targeting high-value enterprise spaces.
Microsoft Patches SharePoint Zero-Day Flaws
Microsoft released emergency fixes for two SharePoint vulnerabilities—CVE-2025-53770 and CVE-2025-53771—being actively exploited. Dubbed “ToolShell” attacks, these zero-days are already hitting organizations worldwide. Update your SharePoint servers immediately.
GENIUS Act Sets U.S. Stablecoin Regulation Framework
The U.S. has taken a bold step with the GENIUS Act, its first legal framework for stablecoins. But critics argue the bill may contain loopholes worse than no regulation at all. It’s a pivotal moment for crypto policy and digital currency oversight.
Developer Defeats AI in Coding Competition
Human ingenuity strikes back! Polish developer Przemysław Dębiak bested a top AI system in a competitive coding battle, reminding us that real brains can still out-code machines—for now. Score one for team human.
Ofcom Tackles UK Scam Calls
UK regulator Ofcom is rolling out new plans to combat scam calls masquerading as mobile numbers. Telecom networks are being mandated to block fake calls at scale. It’s a step forward in keeping the public protected from growing phone-based phishing.
Public Invited to Shape UK Self-Driving Car Rollout
The UK government wants your input on regulating autonomous vehicles. With self-driving tech rapidly developing, this is a rare moment for citizens to help shape the future of mobility and road safety.
Apple Takes Cautious Path with AI Until 2026
While competitors scramble to add AI to everything, Apple is chilling until 2026. Their measured approach aims to prevent flawed releases and focuses on privacy-centric design—a strategy that might win long-term trust over short-term hype.
Tech Giants Split on EU AI Code Compliance
Microsoft supports the EU’s voluntary AI Code ahead of the August 2025 compliance deadline, but Meta refuses to join. OpenAI and Mistral are onboard, signaling mixed sentiment among tech giants over regulation. One thing is clear: the pressure to comply is rising fast.
DCHSpy Malware Masquerades as VPN and Starlink Apps
A new Android spyware campaign, linked to Iran’s MOIS, uses fake VPN and satellite internet apps to spy on dissidents. Known as DCHSpy, the malware targets surveillance-prone regions, showing how trust in brands can be weaponized.
Chinese APT41 Targets African IT Networks via SharePoint
The China-linked APT41 group is conducting espionage on African IT infrastructure using SharePoint-based malware and credential stealers. These campaigns highlight how business platforms can become high-value espionage tools when poorly secured.
3,500+ Websites Hijacked for Crypto Mining
A massive cryptojacking campaign has infected over 3,500 websites using stealthy JavaScript miners and Magecart-like infrastructure. These attacks can slow down performance and drain customer devices—website admins should scan thoroughly.
Hard-Coded Vulnerabilities Found in HPE Devices
HPE has patched exploits in its Instant On devices that allowed attackers admin access via hard-coded credentials. If you're using these access points, make sure you've applied the latest security updates.
Hackers Bypass FIDO Keys with QR Code Phishing
The PoisonSeed group is bypassing FIDO security keys using bogus login pages and QR phishing tactics. By abusing cross-device login systems, they can sidestep even modern multi-factor defenses. Awareness and layered security are more essential than ever.
AI Helps Power Zero Trust Adoptions at Scale
AI is now central to enforcing Zero Trust architectures across all CISA pillars, with over 80% of firms expected to adopt by 2026. It’s becoming clear that human-machine teaming is the next evolutionary step in cybersecurity defense.
How to Go Passwordless—Without Losing Passwords
Just because you’re going “passwordless” doesn’t mean killing passwords outright. This security model shifts authentication toward biometrics and device-based verification to minimize human error. With cyberattacks on the rise, it's time to move beyond the old password playbook.
🔁 Weekly Recap: Major Vulnerabilities and Exploits
This week saw critical zero-days (again), Chrome exploits, macOS spyware, and more. If you missed some of the latest flaws affecting widely used software—from NVIDIA Toolkits to SharePoint—now’s a good time to read up and patch up.
Want to stay ready for anything? From data recovery to bootable OS installs, our Ultimate USBs have your back. Check out our tools today.
```