2025 January(141)  February(191) March(268) April(349) May(260) June(2) July(0) August(0) September(0) 

DATE

NAME

INFO

CATEGORY

SUBCATE

31.3.25

RESURGE

CISA analyzed three files obtained from a critical infrastructure’s Ivanti Connect Secure device after threat actors exploited Ivanti CVE-2025-0282 for initial access. One file—that CISA is calling RESURGE—has functionality similar to SPAWNCHIMERA in how it creates a Secure Shell (SSH) tunnel for command and control (C2).

MALWARE

ICS

31.3.25

CVE-2025-0282

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

VULNEREBILITY

VULNEREBILITY

29.3.25

Crocodilus

Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices

MALWARE

ANDROID

29.3.25

CVE-2025-2825

CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access.

VULNEREBILITY

VULNEREBILITY

29.3.25

Cloudflare incident on March 21, 2025

Multiple Cloudflare services, including R2 object storage, experienced an elevated rate of errors for 1 hour and 7 minutes on March 21, 2025 (starting at 21:38 UTC and ending 22:45 UTC).

INCIDENT

INCIDENT

29.3.25

Browser-in-the-Browser (BitB) phishing technique

A browser-in-the-browser (BitB) attack is a new phishing technique that simulates a login window with a spoofed domain within a parent browser window to steal credentials.

HACKING

PHISHING

29.3.25

CVE-2025-21377

NTLM Hash Disclosure Spoofing Vulnerability

VULNEREBILITY

VULNEREBILITY

29.3.25

CVE-2025-21308

Windows Themes Spoofing Vulnerability

VULNEREBILITY

VULNEREBILITY

29.3.25

Blacklock Ransomware

Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure

RANSOMWARE

RANSOMWARE

28.3.25

Python-based Discord Remote Access Trojan

ANALYSIS OF A DISCORD-BASED REMOTE ACCESS TROJAN (RAT)

MALWARE

RAT

28.3.25

Konni RAT

Analysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques

MALWARE

RAT

28.3.25

J-Magic

Juniper Routers, Network Devices Targeted with Custom Backdoors

CAMPAIGN

MALWARE

28.3.25

Gamaredon

Gamaredon campaign abuses LNK files to distribute Remcos backdoor

CAMPAIGN

MALWARE

28.3.25

Remcos backdoor distributed in the latest campaign attributed to Shuckworm APT

A new campaign attributed to the Shuckworm APT (aka Gamaredon) has been reported by researchers from Cisco Talos. According to the released report, the attackers are targeting users from Ukraine with malicious .LNK files and PowerShell downloaders before infecting them with Remcos RAT payload.

ALERTS

CAMPAIGN

28.3.25

Argenta Bank users targeted with new phishing emails

Argenta is a bank based in Belgium and also operates in the Netherlands and Luxembourg. Recently, Symantec has detected a new wave of phish runs spoofing Argenta's bank services with fake account notifications.

ALERTS

PHISHING

28.3.25

RALord Ransomware

RALord is a new Rust-based ransomware variant identified in the wild. The malware encrypts user data and appends ".RALord" extension to the names of the locked files.

ALERTS

RANSOM

28.3.25

SnakeKeylogger SnakeKeylogger – A Multistage Info Stealer Malware Campaign MALWARE Keylogger

28.3.25

CoffeeLoader CoffeeLoader: A Brew of Stealthy Techniques MALWARE Loader

28.3.25

2025-03-26 -- SmartApeSG traffic for fake browser update leads to NetSupport RAT and StealC

Zip files are password-protected. Of note, this site has a new password scheme. For the password, see the "about" page of this website. MALWARE TRAFFIC MALWARE TRAFFIC

28.3.25

VIPKeyLogger Targets Japan’s Corporate Sector VIPKeyLogger, a stealthy keylogging malware, has been observed in two phishing campaigns targeting Japanese organizations and international companies with local offices in Japan. ALERTS VIRUS

28.3.25

PJobRAT Android malware A new campaign distributing PJobRAT malware for Android has been discovered by the researchers from Sophos. The campaign targets mostly the mobile users from Taiwan and aims at collection and exfiltration of sensitive data including SMS messages, contact lists as well as documents and media file stored on the compromised devices. ALERTS VIRUS

28.3.25

CVE-2025-24799 - SQL injection vulnerability in GLPI CVE-2025-24799 is a recently identified SQL injection vulnerability affecting GLPI, which is a popular and open-source IT Service Management (ITSM) software.

ALERTS

VULNEREBILITY

28.3.25

PJobRAT PJobRAT makes a comeback, takes another crack at chat apps MALWARE ANDROID RAT

28.3.25

CVE-2025-2783 Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

VULNEREBILITY

VULNEREBILITY

28.3.25

CVE-2025-2857 Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.

VULNEREBILITY

VULNEREBILITY

28.3.25

Morphing Meerkat A Phishing Tale of DoH and DNS MX Abuse PHISHING PHaaS

28.3.25

EDRKillShifter Shifting the sands of RansomHub’s EDRKillShifter MALWARE Tool

27.3.25

CVE-2025-29891 - Bypass/Injection vulnerability in Apache Camel CVE-2025-29891 is a second recently identified bypass/injection vulnerability affecting Apache Camel, which is a popular open source integration framework. If successfully exploited, the flaw might enable the remote attackers to inject arbitrary parameters in the HTTP requests that are sent to the Camel application. ALERTS VULNEREBILITY

27.3.25

New Go-based ReaderUpdate macOS malware variant A new Go-based strain of the macOS malware dubbed ReaderUpdate has been discovered in the wild. Previous variants of this malware were based on Crystal, Nim and Rust programming languages. ALERTS VIRUS

27.3.25

Phishing Surge Targets Rakuten Securities Users In recent weeks, there has been an increase in phishing campaigns targeting users of Rakuten Securities (楽天証券), one of Japan’s largest and most well-established online brokerage firms. The company offers a wide range of investment services, including stocks, ETFs, mutual funds, futures, options, forex trading, and NISA (Japan’s tax-advantaged investment accounts). ALERTS PHISHING

27.3.25

New Android malware leverages .NET MAUI framework for detection evasion A new Android malware variant leveraging .NET MAUI framework has been identified in the wild. .NET MAUI is a cross-platform framework used to build native, desktop and mobile apps with C# and XAML.

ALERTS

VIRUS

27.3.25

PlayBoy Locker Ransomware PlayBoy Locker is a ransomware variant discovered last September and initially distributed in form of a Ransomware-as-a-Service (RaaS) offering. The ransomware platform offered multi-OS support including Windows, NAS and ESXi operating systems.

ALERTS

RANSOM

27.3.25

APT36 TURNING AID INTO ATTACK TURNING AID INTO ATTACK: EXPLOITATION OF PAKISTAN’S YOUTH LAPTOP SCHEME TO TARGET INDIA APT BLOG

27.3.25

UI/UX changes Over 150K websites hit by full-page hijack linking to Chinese gambling sites HACKING INJECT

27.3.25

CVE-2020-8515 (CVSS score: 9.8) — An operating system command injection vulnerability in multiple DrayTek router models that could allow remote code execution as root via shell metacharacters to the cgi-bin/mainfunction.cgi URI

VULNEREBILITY

VULNEREBILITY

27.3.25

CVE-2021-20123 (CVSS score: 7.5) — A local file inclusion vulnerability in DrayTek VigorConnect that could allow an unauthenticated attacker to download arbitrary files from the underlying operating system with root privileges via the DownloadFileServlet endpoint

VULNEREBILITY

VULNEREBILITY

27.3.25

CVE-2021-20124 (CVSS score: 7.5) — A local file inclusion vulnerability in DrayTek VigorConnect that could allow an unauthenticated attacker to download arbitrary files from the underlying operating system with root privileges via the WebServlet endpoint

VULNEREBILITY

VULNEREBILITY

27.3.25

CVE-2019-9874 (CVSS score: 9.8) - A deserialization vulnerability in the Sitecore.Security.AntiCSRF module that allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN

VULNEREBILITY

VULNEREBILITY

27.3.25

CVE-2019-9875 (CVSS score: 8.8) - A deserialization vulnerability in the Sitecore.Security.AntiCSRF module that allows an authenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN

VULNEREBILITY

VULNEREBILITY

27.3.25

CVE-2025-26512 CVE-2025-26512 Privilege Escalation Vulnerability in SnapCenter

VULNEREBILITY

VULNEREBILITY

27.3.25

FamousSparrow You will always remember this as the day you finally caught FamousSparrow GROUP APT

26.3.25

ZDI-25-187 (0Day) BEC Technologies Multiple Routers sys ping Command Injection Remote Code Execution Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-186 (0Day) BEC Technologies Multiple Routers Cleartext Password Storage Information Disclosure Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-185 (0Day) BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-184 (0Day) BEC Technologies Multiple Routers Authentication Bypass Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-183 (0Day) Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-182 (0Day) Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-181 (0Day) Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-180 (0Day) 70mai A510 Use of Default Password Authentication Bypass Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-179 (0Day) CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-178 (0Day) CarlinKit CPC200-CCPA update.cgi Improper Verification of Cryptographic Signature Code Execution Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-177 (0Day) CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability ZERO-DAY ZERO-DAY

26.3.25

ZDI-25-176 (0Day) CarlinKit CPC200-CCPA Missing Root of Trust Local Privilege Escalation Vulnerability ZERO-DAY ZERO-DAY

26.3.25

CVE-2025-24813 - Critical path equivalence RCE vulnerability in Apache Tomcat Security researchers have observed active exploitation attempts of CVE-2025-24813, a critical Remote Code Execution (RCE) vulnerability in Apache Tomcat, an open-source servlet container and web server for Java applications. The flaw, caused by a path equivalence issue, allows attackers to bypass security constraints and execute arbitrary code remotely. ALERTS VULNEREBILITY

26.3.25

Dragon RaaS Group: Ransomware targeting the US and European countries Dragon RaaS, a ransomware group that emerged in July 2024, primarily targets organizations in the US, Israel, UK, France and Germany. The group leverages web application vulnerabilities, brute-force attacks and stolen credentials as its main attack vectors using two ransomware variants: a Windows-focused encryptor, likely a modified version of StormCry and a PHP webshell which provides both backdoor functionality and persistent ransomware capabilities. ALERTS RANSOM

26.3.25

New JS downloader observed in recent malspam campaign Symantec has observed a new email campaign delivering a JavaScript downloader as an attachment. The JS arrives under various filenames in an email with variable subjects. ALERTS VIRUS

26.3.25

Funnelweb attack group targets victims in Operation FishMedley The China-backed advanced persistent threat group known as Funnelweb (aka Aquatic Panda, Earth Lusca, FishMonger) was responsible for an extensive campaign identified as Operation FishMedley. The campaign targeted entities including governments, NGOs, and think tanks across numerous countries.

ALERTS

OPERATION

26.3.25

CVE-2025–26319 - Flowise Pre-Auth arbitrary file upload vulnerability CVE-2025–26319 is a recently disclosed pre-auth arbitrary file upload vulnerability affecting Flowise, which is a popular open source tool for developers to build customized LLM (Large Language Model) orchestration flows and AI agents.

ALERTS

VULNEREBILITY

26.3.25

FogDoor backdoor delivery campaign A new campaign targeting Polish-speaking job-seeking developers has been reported to deliver a new backdoor variant dubbed FogDoor. The attackers lure the victims with a fake recruitment test that leads to a download of a .iso archive containing a malicious .lnk file. The executed .lnk file runs a PowerShell script responsible for installing the malware payload. ALERTS VIRUS

26.3.25

CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin Trend Research identified Russian threat actor Water Gamayun exploiting CVE-2025-26633, a zero-day vulnerability in the Microsoft Management Console that attackers exploit to execute malicious code and exfiltrate data.

VULNEREBILITY

VULNEREBILITY

26.3.25

CVE-2025-26633 Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

VULNEREBILITY

VULNEREBILITY

26.3.25

RedCurl In mid to late 2024, Huntress uncovered activity across several organizations in Canada, with similar infrastructure and TTPs used that can be associated with the APT group known as RedCurl (aka Earth Kapre and Red Wolf). This activity goes back as far as November 2023 in the hosts observed by Huntress. GROUP APT

26.3.25

CVE-2025-2783 The Stable channel has been updated to 134.0.6998.177/.178 for Windows which will roll out over the coming days/weeks. A full list of changes in this build is available in the Log.

VULNEREBILITY

VULNEREBILITY

26.3.25

Inside Atlantis AIO Inside Atlantis AIO: Credential Stuffing Across 140+ Platforms CRIME CRIME

26.3.25

CVE-2025-22230 VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.

VULNEREBILITY

VULNEREBILITY

25.3.25

CVE-2024-56346 & CVE-2024-56347 - recent IBM AIX OS vulnerabilities CVE-2024-56346 and CVE-2024-56347 are two recently disclosed critical (CVSS score 10.0 and 9.6 respectively) vulnerabilities affecting IBM AIX operating system. ALERTS VULNEREBILITY

25.3.25

SVCStealer malware SVCStealer is a new C++based infostealing malware identified in the wild. The infostealer collects various sensitive information from the infected endpoints such as system information, credentials, cryptocurrency wallets, data stored in browsers, screenshots, data from messaging applications (Discord, Tox, Telegram) or VPN apps, and others. ALERTS VIRUS

25.3.25

Raspberry Robin Raspberry Robin: Copy Shop USB Worm Evolves to Initial Access Broker Enabling Other Threat Actor Attacks MALWARE Worm

25.3.25

Elephant Beetle Elephant Beetle: Uncovering an Organized Financial-Theft Operation GROUP GROUP

25.3.25

Operational Relay Box (ORB) An Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and Obscured OPERATION OPERATION

25.3.25

Weaver Ant Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation GROUP GROUP

25.3.25

.NET MAUI New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI CAMPAIGN Malware

25.3.25

CVE-2025-24513 (CVSS score: 4.8) – An improper input validation vulnerability that could result in directory traversal within the container, leading to denial-of-service (DoS) or limited disclosure of secret objects from the cluster when combined with other vulnerabilities

VULNEREBILITY

VULNEREBILITY

25.3.25

CVE-2025-24514 (CVSS score: 8.8) – The auth-url Ingress annotation can be used to inject configuration into NGINX, resulting in arbitrary code execution in the context of the ingress-nginx controller and disclosure of secrets accessible to the controller

VULNEREBILITY

VULNEREBILITY

25.3.25

CVE-2025-1097 (CVSS score: 8.8) – The auth-tls-match-cn Ingress annotation can be used to inject configuration into NGINX, resulting in arbitrary code execution in the context of the ingress-nginx controller and disclosure of secrets accessible to the controller

VULNEREBILITY

VULNEREBILITY

25.3.25

CVE-2025-1098 (CVSS score: 8.8) – The mirror-target and mirror-host Ingress annotations can be used to inject arbitrary configuration into NGINX, resulting in arbitrary code execution in the context of the ingress-nginx controller and disclosure of secrets accessible to the controller

VULNEREBILITY

VULNEREBILITY

25.3.25

CVE-2025-1974 (CVSS score: 9.8) – An unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller under certain conditions

VULNEREBILITY

VULNEREBILITY

24.3.25

VanHelsing RaaS Launch VanHelsingRaaS is a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program launched on March 7, 2025. The RaaS model allows a wide range of participants, from experienced hackers to newcomers, to get involved with a $5,000 deposit. RANSOMWARE RaaS

24.3.25

CVE-2025-29927 Next.js is a React framework for building full-stack web applications. Prior to 14.2.25 and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware.

VULNEREBILITY

VULNEREBILITY

23.3.25

CVE-2024-48248 NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).

VULNEREBILITY

VULNEREBILITY

23.3.25

CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability

VULNEREBILITY

VULNEREBILITY

23.3.25

CVE-2024-20440 Cisco Smart Licensing Utility Information Disclosure Vulnerability

VULNEREBILITY

VULNEREBILITY

23.3.25

CVE-2025-30154 reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs

VULNEREBILITY

VULNEREBILITY

23.3.25

CVE-2025-30066 tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

VULNEREBILITY

VULNEREBILITY

22.3.25

New variants of the Albabat ransomware implement multi-OS capabilities A new strain of the Albabat ransomware has been reported to offer multi-OS support, according to latest report from Trend Micro. New Albabat variant is still under active development and it adds Linux and macOS to the list of the targeted platforms. ALERTS RANSOM

22.3.25

New phishing campaign targets Pocket Card users Symantec has detected a phishing campaign targeting Japanese users with fake Pocket Card notification emails. The emails use the subject line:

ALERTS

PHISHING

22.3.25

VanHelsing Ransomware VanHelsing is a new ransomware variant recently identified in the wild. The malware encrypts user data and appends .vanhelsing or .vanlocker extension to the locked files. VanHelsing drops the ransom note in form of a text file called “README.txt” and it is also able to modify the desktop wallpaper.

ALERTS

RANSOM

22.3.25

Campaign impersonating travel bookings site using “ClickFix" technique A phishing campaign impersonating Booking.com to deliver credential stealing malware has been observed targeting hospitality organizations in Asia, North America, Oceania, and Europe. The attackers send fake emails impersonating the online travel agency. ALERTS CAMPAIGN

22.3.25

Recent UAT-5918 APT malicious activities targeting entities in Taiwan Researchers from Cisco Talos have reported a long-lasting campaign targeting entities in Taiwan and attributed to the UAT-5918 APT. The attackers are known to obtain access to the targeted environments usually via vulnerability exploitation.

ALERTS

APT

22.3.25

DarkCrystal RAT distributed in malicious campaign UAC-0200 According to a recent alert released by Ukraine's Computer Emergency Response Team (CERT-UA), a new wave of attacks against the defense sector in Ukraine has been detected. The campaign dubbed as UAC-0200 distributes malicious messages via the Signal messenger leading the victims to execution of DarkTortilla loader, which in turn decrypts and runs the DarkCrystal RAT (aka DCRat) payload.

ALERTS

VIRUS

22.3.25

Custom Betruger backdoor deployed by RansomHub affiliate The Symantec Threat Hunter team has observed activity from a custom backdoor that can be tied to a RansomHub affiliate. RansomHub is a Ransomware-as-a-Service offering and the backdoor has been named Betruger.

ALERTS

VIRUS

21.3.25

Bloody Wolf The notorious cluster changes its toolkit by switching from malware to a legitimate remote administration tool MALWARE Toolkit

21.3.25

ABYSSWORKER Shedding light on the ABYSSWORKER driver MALWARE Driver

21.3.25

Operation FishMedley ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON OPERATION OPERATION

21.3.25

UAT-5918 UAT-5918 targets critical infrastructure entities in Taiwan GROUP GROUP

21.3.25

Trusted relationship attacks Trusted relationship attacks: trust, but verify ATTACK ATTACK

21.3.25

-=TWELVE= -=TWELVE=- is back GROUP GROUP

21.3.25

Head Mare Head Mare: adventures of a unicorn in Russia and Belarus GROUP GROUP

21.3.25

Arcane stealer What’s intriguing about this malware is how much it collects. It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla and DynDNS. The stealer was named Arcane, not to be confused with the well-known Arcane Stealer V. MALWARE Stealer

21.3.25

CVE-2024-20439 (CVSS score: 9.8) - The presence of an undocumented static user credential for an administrative account that an attacker could exploit to log in to an affected system

VULNEREBILITY

VULNEREBILITY

21.3.25

CVE-2024-20440 (CVSS score: 9.8) - A vulnerability arising due to an excessively verbose debug log file that an attacker could exploit to access such files by means of a crafted HTTP request and obtain credentials that can be used to access the API

VULNEREBILITY

VULNEREBILITY

21.3.25

CVE-2024-56347 (CVSS score: 9.6) - An improper access control vulnerability that could permit a remote attacker to execute arbitrary commands via the AIX nimsh service SSL/TLS protection mechanism

VULNEREBILITY

VULNEREBILITY

21.3.25

CVE-2024-56346 (CVSS score: 10.0) - An improper access control vulnerability that could permit a remote attacker to execute arbitrary commands via the AIX nimesis NIM master service

VULNEREBILITY

VULNEREBILITY

21.3.25

CVE-2025-23120 A vulnerability allowing remote code execution (RCE) by authenticated domain users.

VULNEREBILITY

VULNEREBILITY

20.3.25

ZDI-25-175 (0Day) Luxion KeyShot USDC File Parsing Use-After-Free Remote Code Execution Vulnerability ZERO-DAY ZERO-DAY

20.3.25

ZDI-25-174 (0Day) Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ZERO-DAY ZERO-DAY

20.3.25

ZDI-25-173 (0Day) Luxion KeyShot DAE File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability ZERO-DAY ZERO-DAY

20.3.25

Paragon's Adroid Spyware Virtue or Vice? A First Look at Paragon’s Proliferating Spyware Operations MALWARE Android

20.3.25

CVE-2025-1316 (CVSS score: 9.3) - Edimax IC-7100 IP camera contains an OS command injection vulnerability due to improper input sanitization that allows an attacker to achieve remote code execution via specially crafted requests (Unpatched due to the device reaching end-of-life)

VULNEREBILITY

VULNEREBILITY

20.3.25

CVE-2017-12637 (CVSS score: 7.5) - SAP NetWeaver Application Server (AS) Java contains a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that allows a remote attacker to read arbitrary files via a .. (dot dot) in the query string

VULNEREBILITY

VULNEREBILITY

20.3.25

New Steganographic malware campaign exploits JPEG files to distribute Infostealers A new steganographic malware campaign has been identified, using JPEG image files to distribute various infostealer malwares. The attack starts by luring users into downloading an obfuscated JPEG file, which contains hidden malicious scripts and executables. ALERTS VIRUS

20.3.25

Fake captchas entice users to run malicious commands for rootkit deployment Another fake captcha campaign is resulting in rootkits being deployed to unsuspecting victims. The attack is spread via fake captchas that impersonate popular software tools and websites, the captcha copies a malicious powershell command using curl to the users clipboard and provides instructions on how to run it to prove they are human.

ALERTS

VIRUS

20.3.25

CVE-2024-27564 - ChatGPT commit f9f4bbc SSRF vulnerability exploited in the wild New reports emerged about threat actors actively exploiting an older Server-Side Request Forgery (SSRF) vulnerability (CVE-2024-27564) affecting OpenAI’s ChatGPT.

ALERTS

VULNEREBILITY

20.3.25

NailaoLocker Ransomware NailaoLocker is a ransomware variant distributed last year in campaigns targeting various European healthcare organizations. The attackers responsible for the attacks have been leveraging previously disclosed Check Point Security Gateway vulnerability CVE-2024-24919 in the initial attack stages.

ALERTS

RANSOM

20.3.25

AnubisBackdoor: New Python-based malware linked to Coreid APT group A relatively new backdoor malware dubbed AnubisBackdoor has been spotted in the wild. This Python-based backdoor is attributed to the Savage Ladybug group, which is reportedly connected to the notorious Coreid (aka Fin7) APT group. ALERTS VIRUS

20.3.25

CVE-2025-27636 - Apache Camel Message Header Injection vulnerability CVE-2025-27636 is a recently identified bypass/injection vulnerability affecting Apache Camel, which is a popular open source integration framework.

ALERTS

VULNEREBILITY

20.3.25

StilachiRAT malware StilachiRAT is a new remote access trojan variant discovered recently by researchers from Microsoft. The malware possesses extensive remote control as well as infostealing capabilities. ALERTS VIRUS

20.3.25

Black Basta Ransomware Analysis of Black Basta Ransomware Chat Leaks RANSOMWARE ANALYSIS

20.3.25

UAC-0200: Шпигунство за оборонно-промисловим комплексом за допомогою DarkCrystal RAT (CERT-UA#14045) Урядовою командою реагування на компʼютерні надзвичайні події CERT-UA фіксуються непоодинокі випадки здійснення цільових кібератак як у відношенні співробітників підприємств оборонно-промислового комплексу, так й окремих представників Сил оборони України. BATTLEFIELD  UKRAINE BATTLEFIELD UKRAINE

20.3.25

CVE-2024-4577 In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions.

VULNEREBILITY

VULNEREBILITY

20.3.25

PEAKLIGHT PEAKLIGHT: Decoding the Stealthy Memory-Only Malware MALWARE DROPPER

20.3.25

Auto Dealership Supply Chain Attack Over 100 auto dealerships were being abused compliments of a supply chain attack of a shared video service unique to dealerships. HACKING MALWARE

20.3.25

ClearFake ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery MALWARE JAVASCRIPT

20.3.25

ClearFake ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery CAMPAIGN MALWARE

19.3.25

Protection Highlight: Thwarting Ransomware with Carbon Black Endpoint Standard Today's ransomware is innovating at a rapid pace. Going beyond simple file encryption, ransomware increasingly leverages unknown variants and fileless techniques. ALERTS RANSOM

19.3.25

JPHP downloader uncovered A new downloader compiled with JPHP was recently observed. JPHP is an interpreter that allows PHP scripts to execute in a Java Virtual Machine. This particular malware was originally delivered in a ZIP file and leveraged Telegram for its C2 communications. Potential downloaded payloads include infostealers such as Danabot.

ALERTS

VIRUS

19.3.25

VenomRat malware campaign uses VHD files for data exfiltration A VenomRat malware campaign using VHD files has been observed in the wild. The attack begins with a phishing email containing an archive attachment disguised as a purchase order to lure users. Inside the archive there is a .vhd file which mounts itself as a hard disk when opened.

ALERTS

CAMPAIGN

19.3.25

New XCSSET macOS malware variant discovered According to recent reports, a new variant of XCSSET, the macOS modular malware, has been observed by researchers at Microsoft. First discovered in 2020, XCSSET is a sophisticated modular malware known to target users by infecting Apple Xcode projects.

ALERTS

VIRUS

19.3.25

A new Sobolan malware campaign Threat Actors use compromised interactive computing environments like Jupyter Notebooks to spread Sobolan malware in a multi stage attack. ALERTS CAMPAIGN

19.3.25

Rules File Backdoor New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents ATTACK AI

19.3.25

CVE-2025-20061 An operating system command injection vulnerability that could permit an attacker to execute arbitrary commands on the affected system via specially crafted POST requests containing an email parameter

VULNEREBILITY

VULNEREBILITY

19.3.25

CVE-2025-20014 An operating system command injection vulnerability that could permit an attacker to execute arbitrary commands on the affected system via specially crafted POST requests containing a version parameter

VULNEREBILITY

VULNEREBILITY

19.3.25

CVE-2025-30066 tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

VULNEREBILITY

VULNEREBILITY

19.3.25

ZDI-CAN-25373 (0Day) Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Zero-Day Zero-Day

19.3.25

CVE-2024-54085 AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

VULNEREBILITY

VULNEREBILITY

19.3.25

Operation AkaiRyū Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor OPERATION OPERATION

19.3.25

BADBOX 2.0 Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes BOTNET BOTNET

18.3.25

StilachiRAT StilachiRAT analysis: From system reconnaissance to cryptocurrency theft MALWARE RAT

18.3.25

CVE-2025-24813 Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

VULNEREBILITY

VULNEREBILITY

17.3.25

CVE-2025-1316 Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device

VULNEREBILITY

VULNEREBILITY

17.3.25

CVE-2025-30066 tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

VULNEREBILITY

VULNEREBILITY

16.3.25

Decrypting Encrypted files from Akira Ransomware

Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs

RANSOMWARE

ENCRYPTED

16.3.25

VPN brute-force attacks

Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices

ATTACK

VPN

16.3.25

CVE-2025-20115

A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

VULNEREBILITY

VULNEREBILITY

16.3.25

StealBit

THREAT ANALYSIS REPORT: Inside the LockBit Arsenal - The StealBit Exfiltration Tool

MALWARE

TOOL

16.3.25

SuperBlack

New Ransomware Operator Exploits Fortinet Vulnerability Duo

RANSOMWARE

RANSOMWARE

16.3.25

CVE-2025-21590

An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device.

VULNEREBILITY

VULNEREBILITY

16.3.25

OctoV2 mobile malware distributed as fake DeepSeek AI app

A new variant of the OctoV2 Android banking malware has been spread recently under the disguise of a DeepSeek AI mobile app. DeepSeek is a recently released AI-powered chatbot, much similar to the well known ChatGPT.

ALERTS

AI

14.3.25

SuperBlack - a new Lockbit ransomware variant

SuperBlack is a new ransomware variant based on the leaked Lockbit builder. According to recent reports, a newly observed distribution of this malware has been attributed to the threat actor dubbed as Mora_001 (a possible Lockbit affiliate).

ALERTS

RANSOM

14.3.25

LithiumWare Ransomware

LithiumWare is a new ransomware strain observed in the wild. The malware encrypts user data and appends random four-character extensions to the locked files.

ALERTS

RANSOM

14.3.25

Vedalia threat group tied to new Android spyware called KoSpy

KoSpy is a recently discovered Android spyware that has been associated with the North Korean APT Vedalia (also known as APT37 ScarCruft). The spyware was observed masquerading as numerous utility applications to entice/trick its victims.

ALERTS

VIRUS

14.3.25

Hellcat: Ransomware-as-a-Service group

Since its identification in late 2024, the Hellcat Ransomware Group has emerged as a prominent Ransomware-as-a-Service (RaaS) threat claiming attacks on critical national infrastructure and government organizations.

ALERTS

RANSOM

14.3.25

Sosano backdoor targets UAE Aviation and Satellite firms

An email campaign targeting organizations in the UAE associated with aviation and satellite communications has been reported. The attack leveraged a compromised email account from an Indian electronics firm to send malicious emails aimed at luring victims.

ALERTS

VIRUS

14.3.25

MassJacker

Captain MassJacker Sparrow: Uncovering the Malware’s Buried Treasure

MALWARE

Cryptojacking

14.3.25

OBSCURE#BAT

Analyzing OBSCURE#BAT: Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits

MALWARE

Rootkit

13.3.25

DocSwap mobile malware

DocSwap is a new mobile malware variant distributed under the disguise of a "document viewing authentication" mobile app.

ALERTS

VIRUS

13.3.25

A new campaign distributing scam crypto investment platforms

A new campaign spreading fraudulent cryptocurrency investment platforms has been reported by researchers from Palo Alto. The attackers leverage websites and Android mobile apps masqueraded as known brands of retail stores, financial institutions or technology companies to lure their victims.

ALERTS

CRYPTOCURRENCY

13.3.25

CVE-2025-25181 - Advantive VeraCore SQL Injection vulnerability

CVE-2025-25181 is a SQL Injection vulnerability affecting Advantive VeraCore, which is an order fulfillment and warehouse management software. If successfully exploited, the flaw might allow the remote attackers to execute arbitrary SQL commands via the PmSess1 parameter and gain unauthorized access to sensitive data.

ALERTS

VULNEREBILITY

13.3.25

Ballista botnet targets TP-Link Archer routers via vulnerability exploitation

A new botnet dubbed Ballista has targeted organizations in Australia, China, Mexico, and the US focusing on healthcare, manufacturing, services, and technology sectors.

ALERTS

BOTNET

13.3.25

Credential Theft Campaign Disguised as Construction Quote Requests

An actor has been running a large phishing campaign, targeting businesses with emails disguised as requests for quotations. The emails, sent from multiple Outlook, Live, Hotmail, and MSN addresses, urge recipients to review an attached document, claiming it contains the scope of work for an urgent project.

ALERTS

PHISHING

13.3.25

PlayPraetor mobile malware

PlayPraetor is a mobile malware recently distributed via fake Play Store websites. Many of the observed fraudulent domains leverage typo-squatting techniques to lure the unsuspecting victims into downloading the malicious binaries.

ALERTS

VIRUS

13.3.25

CVE-2024-32444 and CVE-2024-32555 - WordPress RealHome and Easy Real Estate Plugin vulnerabilities

CVE-2024-32444 and CVE-2024-32555 are two recently disclosed vulnerabilities affecting WordPress RealHome and WordPress Easy Real Estate Plugin respectively.

ALERTS

VULNEREBILITY

13.3.25

Blind Eagle malicious .url files variant

Blind Eagle (aka APT-C-36), is a threat actor group that engages in both espionage and cyber-crime. It primarily targets organizations in Colombia and other Latin American countries focusing on government institutions, financial organizations, and critical infrastructure.

ALERTS

APT

13.3.25

Malvertising campaign found in pirate streaming sites leading to infostealers

A malvertising campaign has been recently disclosed by Microsoft. The malicious actors start by injecting malvertising redirectors into videos hosted on pirate streaming sites.

ALERTS

VIRUS

13.3.25

Phishing Campaign Impersonates Korean Tax Service

A new wave phishing is making rounds in South Korea, disguising itself as an official email from the Korean National Tax Service (NTS). The email claims to contain an electronic tax invoice and includes an HTML attachment named NTS_eTaxInvoice.html.

ALERTS

PHISHING

13.3.25

Malicious operations attributed to the EncryptHub threat actor

EncryptHub is a new threat actor engaging in malicious operations distributing ransomware and infostealers (StealC, Rhadamanthys) to the unsuspecting victims.

ALERTS

RANSOM

13.3.25

Leafperforator APT conducts attacks on maritime sector

A new malicious campaign targeting the maritime and nuclear energy sector across South and Southeast Asia, the Middle East, and Africa has been attributed to the Leafperforator (also known as SideWinder) APT group.

ALERTS

APT

13.3.25

KoSpy

Lookout Discovers New Spyware by North Korean APT37

MALWARE

Spyware

13.3.25

CVE-2025-25292

Ruby SAML allows a SAML authentication bypass due to namespace handling (parser differential)

VULNEREBILITY

VULNEREBILITY

13.3.25

CVE-2025-25291

Ruby SAML allows a SAML authentication bypass due to DOCTYPE handling (parser differential)

VULNEREBILITY

VULNEREBILITY

13.3.25

CVE-2025-27363

n out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files.

VULNEREBILITY

VULNEREBILITY

13.3.25

Actor UNC3886

Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers

GROUP

GROUP

12.3.25

CVE-2017-0929

(CVSS score: 7.5) - DotNetNuke

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2020-7796

(CVSS score: 9.8) - Zimbra Collaboration Suite

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2021-21973

(CVSS score: 5.3) - VMware vCenter

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2021-22054

(CVSS score: 7.5) - VMware Workspace ONE UEM

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2021-22175

(CVSS score: 9.8) - GitLab CE/EE

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2021-22214

CVSS score: 8.6) - GitLab CE/EE

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2021-39935

(CVSS score: 7.5) - GitLab CE/EE

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2023-5830

(CVSS score: 9.8) - ColumbiaSoft DocumentLocator

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2024-6587

(CVSS score: 7.5) - BerriAI LiteLLM

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2024-21893

(CVSS score: 8.2) - Ivanti Connect Secure

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-24983

(CVSS score: 7.0) - A Windows Win32 Kernel Subsystem use-after-free (UAF) vulnerability that allows an authorized attacker to elevate privileges locally

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-24984

(CVSS score: 4.6) - A Windows NTFS information disclosure vulnerability that allows an attacker with physical access to a target device and the ability to plug in a malicious USB drive to potentially read portions of heap memory

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-24985

(CVSS score: 7.8) - An integer overflow vulnerability in Windows Fast FAT File System Driver that allows an unauthorized attacker to execute code locally

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-24991

(CVSS score: 5.5) - An out-of-bounds read vulnerability in Windows NTFS that allows an authorized attacker to disclose information locally

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-24993

(CVSS score: 7.8) - A heap-based buffer overflow vulnerability in Windows NTFS that allows an unauthorized attacker to execute code locally

VULNEREBILITY

VULNEREBILITY

12.3.25

CVE-2025-26633

(CVSS score: 7.0) - An improper neutralization vulnerability in Microsoft Management Console that allows an unauthorized attacker to bypass a security feature locally

VULNEREBILITY

VULNEREBILITY

12.3.25

Apple security releases

This document lists security updates and Rapid Security Responses for Apple software.

VULNEREBILITY

Update

12.3.25

Blind Eagle:

Blind Eagle: …And Justice for All

APT

APT

11.3.25

New Poco RAT distribution campaign

A new campaign distributing Poco RAT to Spanish-speaking users in Latin America has been reported in the wild. The campaign has been attributed to the Darkling APT (aka Dark Caracal). The group is known to leverage Bandook-based backdoors in their attacks.

ALERTS

VIRUS

11.3.25

CVE-2024-13159 - Ivanti Endpoint Manager (EPM) Absolute Path Traversal vulnerability

CVE-2024-13159 is a critical (CVSS score 9.8) absolute path traversal vulnerability affecting the Ivanti Endpoint Manager (EPM) software. If successfully exploited, the flaw might allow a remote unauthenticated attacker to leak sensitive information.

ALERTS

VULNEREBILITY

11.3.25

Ballista Botnet

Cato CTRL™ Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers

BOTNET

BOTNET

11.3.25

SideWinder

SideWinder targets the maritime and nuclear sectors with an updated toolset

APT

APT

11.3.25

CVE-2024-57968

An unrestricted file upload vulnerability in Advantive VeraCore that allows a remote unauthenticated attacker to upload files to unintended folders via upload.apsx

VULNEREBILITY

VULNEREBILITY

11.3.25

CVE-2025-25181

An SQL injection vulnerability in Advantive VeraCore that allows a remote attacker to execute arbitrary SQL commands

VULNEREBILITY

VULNEREBILITY

11.3.25

CVE-2024-13159

An absolute path traversal vulnerability in Ivanti EPM that allows a remote unauthenticated attacker to leak sensitive information

VULNEREBILITY

VULNEREBILITY

11.3.25

CVE-2024-13160

An absolute path traversal vulnerability in Ivanti EPM that allows a remote unauthenticated attacker to leak sensitive information

VULNEREBILITY

VULNEREBILITY

11.3.25

CVE-2024-13161

An absolute path traversal vulnerability in Ivanti EPM that allows a remote unauthenticated attacker to leak sensitive information

VULNEREBILITY

VULNEREBILITY

11.3.25

CVE-2024-12297

Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation.

VULNEREBILITY

VULNEREBILITY

10.3.25

Strela Stealer targets MS Outlook users credentials

Strela Stealer is a malware infostealer typically distributed through phishing campaigns affecting users in Italy, Germany, Spain, and Ukraine. It is designed to target specific email clients (notably Microsoft Outlook and Mozilla Thunderbird) and exfiltrate email login credentials.

ALERTS

VIRUS

10.3.25

Boramae Ransomware

Boramae is a new ransomware discovered just recently in the threat landscape and a suspected variant of the Beast aka BlackLockbit malware family. The malware encrypts user files and appends ".boramae" to them.

ALERTS

RANSOM

10.3.25

Phantom-Goblin operation spreading infostealers to victims

Phantom-Goblin is the name of a malicious infostealing campaign recently identified in the wild. The attackers responsible are leveraging social engineering techniques luring victims into execution of malicious .LNK files.

ALERTS

OPERATION

10.3.25

Ebyte Ransomware

Desert Dexter is a recently reported malicious operation targeting users based in Middle East and North Africa. The responsible threat actors are distributing malicious binaries hosted on legitimate file-sharing portals or via seemingly harmless Telegram channels.

ALERTS

RANSOM

10.3.25

Polymorphic Extensions

Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension

HACKING

HACKING

10.3.25

Desert Dexter. Attacks

Desert Dexter. Attacks on Middle Eastern countries

CAMPAIGN

Malware

10.3.25

SilentCryptoMiner

Undercover miner: how YouTubers get pressed into distributing SilentCryptoMiner as a restriction bypass tool

CRYPTOCURRENCY

CRYPTOCURRENCY

9.3.25

CVE-2025-27840

Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory).

VULNEREBILITY

VULNEREBILITY

9.3.25

CVE-2025-1316

Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device

VULNEREBILITY

VULNEREBILITY

8.3.25

BADBOX 2.0

Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes

MALWARE

Android

8.3.25

Phishing Campaign Using Private Video Sharing

We’re aware that phishers have been sharing private videos to send false videos, including an AI generated video of YouTube’s CEO Neal Mohan announcing changes in monetization.

CAMPAIGN

PHISHING

8.3.25

Snail Mail Fail

Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear

CAMPAIGN

Ransom

8.3.25

Zloader 2.9.4.0

Inside Zloader’s Latest Trick: DNS Tunneling

MALWARE

Loader

8.3.25

Skuld stealer

TMPN (Skuld) Stealer: The dark side of open source

MALWARE

Stealer

8.3.25

Trojan-Downloader.Win32.TookPS

Trojans disguised as AI: Cybercriminals exploit DeepSeek’s popularity

MALWARE

AI

8.3.25

LARVA-208

(EncryptHub) is a threat actor that has come to the forefront with highly sophisticated spear-phishing attacks since 26 June 2024. In the attacks it has carried out, it exhibits a different operational strategy by carrying out all the processes necessary to obtain initial access through personalized SMS (smishing) or by calling the person directly (vishing) and tricking the victim into installing remote monitoring and management (RMM) software.

GROUP

GROUP

8.3.25

Ragnar Loader

(a.k.a Sardonic Backdoor) is a sophisticated toolkit of the Monstrous Mantis

MALWARE

Loader

7.3.25

Desert Dexter malicious campaign

Desert Dexter is a recently reported malicious operation targeting users based in Middle East and North Africa. The responsible threat actors are distributing malicious binaries hosted on legitimate file-sharing portals or via seemingly harmless Telegram channels.

ALERTS

CAMPAIGN

7.3.25

Latest Njrat variant uses Microsoft Dev Tunnels for C2 communications

A new variant of the NjRAT malware has been reported in the wild. NjRAT (also known as Bladabindi or Ratenjay) is an older but still widely used Remote Access Trojan (RAT). This malware is often used to extract data from the compromised endpoints, send commands via remote shell, manipulate the registry as well as download additional payloads.

ALERTS

VIRUS

7.3.25

Medusa ransomware activity on the rise

Medusa ransomware attacks jumped by 42% between 2023 and 2024. This increase in activity continues to escalate, with almost twice as many Medusa attacks observed in January and February 2025 as in the first two months of 2024.

ALERTS

RANSOM

7.3.25

A new campaign targeting ISP infrastructure with infostealers

A new campaign targeting ISP (Internet service providers) infrastructure with infostealers and cryptocurrency miners has been reported in the wild. In the initial attack stages the threat actors are leveraging brute force attacks to access the vulnerable environments.

ALERTS

VIRUS

7.3.25

Cobalt Strike kit

Unmasking the new persistent attacks on Japan

MALWARE

Kit

7.3.25

CVE-2024-4577

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions

VULNEREBILITY

VULNEREBILITY

7.3.25

Medusa ransomware

The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024.

RANSOMWARE

RANSOMWARE

7.3.25

CVE-2025-25012

Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8.17.1, this is exploitable by users with the Viewer role

VULNEREBILITY

VULNEREBILITY

7.3.25

EncryptRAT

Unveiling EncryptHub: Analysis of a multi-stage malware campaign

MALWARE

RAT

7.3.25

JavaScript Backdoors Enabling Persistent Attacker Access

Thousands of websites hit by four backdoors in 3rd party JavaScript attack

ATTACK

JavaScript

6.3.25

Silk Typhoon

Silk Typhoon targeting IT supply chain

GROUP

APT

6.3.25

Poco RAT

The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT

MALWARE

RAT

6.3.25

Dark Caracal

The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT

GROUP

APT

6.3.25

Lotus Panda

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

GROUP

APT

5.3.25

Phishing campaign used to deliver Havoc malware

In a new report, researchers at Fortinet have detailed a phishing campaign that was used to deliver Havoc malware. Havoc is a malicious framework, akin to Cobalt Strike, that is actively leveraged to compromise victims.

ALERTS

CAMPAIGN

5.3.25

Danger & Loches - recent Globeimposter ransomware variants seen in the wild

Dange and Loches are the two most recently identified variants of the Globeimposter ransomware family. The malware will encrypt user data and append .danger or .loches extension to the locked files respectively.

ALERTS

RANSOM

5.3.25

GrassCall malware campaign spreads infostealers to job seekers

GrassCall is a recently identified campaign attributed to the threat group known as Crazy Evil. The attack has been targeting job seekers with fake job interviews in efforts to distribute malicious executables used for infostealing.

ALERTS

VIRUS

5.3.25

CVE-2024-12356 - BeyondTrust PRA and RS vulnerability

CVE-2024-12356  is a critical (CVSS score 9.8) command injection vulnerability affecting the BeyondTrust Privileged Remote Access (PRA) and BeyondTrust Remote Support (RS) software. If successfully exploited, the flaw might allow an unauthenticated attacker to inject commands that are run as a site user.

ALERTS

VULNEREBILITY

5.3.25

Leveraging malicious LNK files and Null-AMSI tool to deliver AsyncRAT

A malware campaign using malicious LNK files disguised as wallpapers to lure users has been observed. As part of the attack vector, the open-source Null-AMSI tool is employed to bypass malware scanning interfaces (AMSI) and Event Tracing for Windows (ETW).

ALERTS

VIRUS

5.3.25

Attackers spread Winos4.0 malware using taxation as a lure

The Winos4.0 malware framework has been used by threat groups to perpetrate attacks against intended victims. In a recent report from Fortinet, they have outlined an attack observed against users in Taiwan, using a tax related lure to distribute Winos4.0 malware.

ALERTS

VIRUS

5.3.25

Fake browser updates being distributed through malicious redirects

Security researchers have observed recent malware campaigns utilizing web-based malware distribution via compromised sites rather than relying solely on email-based attacks to spread malicious links.

ALERTS

VIRUS

5.3.25

Typosquatted

Typosquatted Go Packages Deliver Malware Loader Targeting Linux and macOS Systems

MALWARE

Go

5.3.25

Black Basta and Cactus Ransomware

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal

RANSOMWARE

RANSOMWARE

5.3.25

BackConnect

Qbot is Back.Connect

MALWARE

Stealer

5.3.25

CVE-2025-22224

(CVSS score: 9.3) - A Time-of-Check Time-of-Use (TOCTOU) vulnerability that leads to an out-of-bounds write, which a malicious actor with local administrative privileges on a virtual machine could exploit to execute code as the virtual machine's VMX process running on the host

VULNEREBILITY

VULNEREBILITY

5.3.25

CVE-2025-22225

(CVSS score: 8.2) - An arbitrary write vulnerability that a malicious actor with privileges within the VMX process could exploit to result in a sandbox escape

VULNEREBILITY

VULNEREBILITY

5.3.25

CVE-2025-22226

(CVSS score: 7.1) - An information disclosure vulnerability due to an out-of-bounds read in HGFS that a malicious actor with administrative privileges to a virtual machine could exploit to leak memory from the vmx process

VULNEREBILITY

VULNEREBILITY

5.3.25

Polyglot Malware

Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware

MALWARE

Go

5.3.25

clipper malware

Infostealer Campaign against ISPs

MALWARE

Infostealer

4.3.25

CVE-2023-20118

(CVSS score: 6.5) - A command injection vulnerability in the web-based management interface of Cisco Small Business RV Series routers that allows an authenticated, remote attacker to gain root-level privileges and access unauthorized data (Unpatched due to the routers reaching end-of-life status)

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2022-43939

(CVSS score: 8.6) - An authorization bypass vulnerability in Hitachi Vantara Pentaho BA Server that stems from the use of non-canonical URL paths for authorization decisions (Fixed in August 2024 with versions 9.3.0.2 and 9.4.0.1)

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2022-43769

(CVSS score: 7.8) - An improper resource shutdown or release vulnerability in Microsoft Windows Win32k that allows for local, authenticated privilege escalation, and running arbitrary code in kernel mode (Fixed in December 2018)

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2018-8639

(CVSS score: 7.8) - An improper resource shutdown or release vulnerability in Microsoft Windows Win32k that allows for local, authenticated privilege escalation, and running arbitrary code in kernel mode (Fixed in December 2018)

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2024-4885

(CVSS score: 9.8) - A path traversal vulnerability in Progress WhatsUp Gold that allows an unauthenticated attacker to achieve remote code execution (Fixed in version 2023.1.3 in June 2024)

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2024-43093

A privilege escalation flaw in the Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective sub-directories.

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2024-50302

A privilege escalation flaw in the HID USB component of the Linux kernel that could lead to a leak of uninitialized kernel memory to a local attacker through specially crafted HID reports.

VULNEREBILITY

VULNEREBILITY

4.3.25

JavaGhost’s

JavaGhost’s Persistent Phishing Attacks From the Cloud

GROUP

GROUP

4.3.25

Havoc

Havoc: SharePoint with Microsoft Graph API turns into FUD C2

MALWARE

Loader

4.3.25

CVE-2025-0285

An arbitrary kernel memory mapping vulnerability in version 7.9.1 caused by a failure to validate user-supplied data lengths. Attackers can exploit this flaw to escalate privileges.

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2025-0286

An arbitrary kernel memory write vulnerability in version 7.9.1 due to improper validation of user-supplied data lengths.

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2025-0287

A null pointer dereference vulnerability in version 7.9.1 caused by the absence of a valid MasterLrp structure in the input buffer.

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2025-0288

An arbitrary kernel memory vulnerability in version 7.9.1 caused by the memmove function, which fails to sanitize user-controlled input.

VULNEREBILITY

VULNEREBILITY

4.3.25

CVE-2025-0289

An insecure kernel resource access vulnerability in version 17 caused by failure to validate the MappedSystemVa pointer before passing it to HalReturnToFirmware.

VULNEREBILITY

VULNEREBILITY

4.3.25

Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks

Paragon Partition Manager's BioNTdrv.sys driver, versions prior to 2.0.0, contains five vulnerabilities.

ALERT

ALERT

3.3.25

Vo1d Botnet

Long Live The Vo1d Botnet: New Variant Hits 1.6 Million TV Globally

BOTNET

BOTNET

1.3.25

LCRYX Ransomware

LCRYX is a VBScript-based ransomware discovered in the wild last year. The malware encrypts user data, appends ‘.lcryx’ to the locked files and demands ransom payment in the Bitcoin cryptocurrency.

ALERTS

RANSOM

1.3.25

New Squidoor backdoor variant distributed in latest campaigns

Squidoor is a modular multi-platform backdoor variant supporting both Windows and Linux platforms. According to the researchers from Palo Alto, the newest strain of this malware is distributed in attacks associated with suspected Chinese threat actors.

ALERTS

VIRUS

1.3.25

Bank of Yokohama users targeted with new phishing emails

In Japan, the Bank of Yokohama is the largest regional bank headquartered in Yokohama.

ALERTS

PHISHING

1.3.25

Billbug (aka Lotus Blossom) threat group uses Sagerunex malware to target numerous victims

The Billbug (aka Lotus Blossom) threat group has been observed leveraging Sagerunex malware, along with other hacking tools, to target numerous victims across industries.

ALERTS

APT

1.3.25

CVE-2024-53197

(CVSS score: N/A) - An out-of-bounds access vulnerability for Extigy and Mbox devices

VULNEREBILITY

VULNEREBILITY

1.3.25

CVE-2024-50302

(CVSS score: 5.5) - A use of an uninitialized resource vulnerability that could be used to leak kernel memory

VULNEREBILITY

VULNEREBILITY