2025 January(141)  February(191) March(268) April(349) May(260) June(2) July(0) August(0) September(0) 

DATE

NAME

INFO

CATEGORY

SUBCATE

31.1.25 SparkRAT - a cross-platform modular malware SparkRAT is a Golang-based modular malware variant initially discovered back in 2022. With its cross-platform support it targets various architectures including Windows, macOS, and Linux. The malware was used in various targeted cyber espionage operations just last year. ALERTS VIRUS
31.1.25 Windows Locker ransomware A new variant of the Windows Locker ransomware has been identified in the wild. The malware encrypts user data and appends .winlocker extension to the locked files. A ransom request is dropped in form of a text file "Readme.txt" with information on how to contact the threat actors and on how to pay the ransom demands. Windows Locker ransomware has the functionality to maintain persistence, disable firewall and task manager as well as to delete backups and volume shadow copies on the compromised machine. ALERTS RANSOM
29.1.25 Aquabot v3 - a new Mirai variant in the field A new Mirai malware variant dubbed Aquabot v3 has been observed in the wild. The malware has been reported to exploit CVE-2024-41710 which is a command injection vulnerability affecting various Mitel devices. The malware is also able to exploit some older vulnerabilities affecting Hadoop YARN or various Linksys devices. Aquabot v3 supports a wide range of architectures including x86 and ARM. Functionality-wise the malware is predominately used for initiating DDoS attacks from the compromised devices. ALERTS BOTNET
29.1.25 Recent activities of the GamaCopy threat group A new malicious activity attributed to the GamaCopy threat group has been reported in the wild. The TTPs utilized by the group share certain degree of overlap with another APT called Core Werewolf and the discovered activity mimics some of the older attacks conducted by the Shuckworm (aka Gamaredon) APT. The attackers leverage self-extracting (SFX) archive files to deliver decoy .PDF documents alongside of UltraVNC remote desktop tool used for remote access to the compromised endpoints. ALERTS GROUP
29.1.25 TorNet backdoor TorNet is a new backdoor variant spread within an ongoing malicious campaign targeting prevalently Germany and Poland. The threat actors responsible have also been distributing various other malware payloads including Agent Tesla and Snake Keylogger. According to the recent Cisco Talos report, the attack chain leverages phishing emails disguised as correspondence from financial institutions and manufacturing or logistics companies. ALERTS VIRUS
28.1.25 New Lumma Stealer campaign using fake Captchas A new malware campaign that leverages fake CAPTCHA verification checks to deliver Lumma Stealer has been observed. This campaign has targeted victims from around the world (Argentina, Colombia, U.S., Philippines etc.) and across various industries (such as financial institutions, healthcare, marketing and telecom organizations). ALERTS VIRUS
28.1.25 CVE-2024-50050 Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead. VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2025-22218 (CVSS score: 8.5) - A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2025-22219 (CVSS score: 6.8) - A malicious actor with non-administrative privileges may be able to inject a malicious script that may lead to arbitrary operations as admin user via a stored cross-site scripting (XSS) attack VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2025-22220 (CVSS score: 4.3) - A malicious actor with non-administrative privileges and network access to Aria Operations for Logs API may be able to perform certain operations in the context of an admin user VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2025-22221 (CVSS score: 5.2) - A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2025-22222 (CVSS score: 7.7) - A malicious user with non-administrative privileges may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known VULNEREBILITY VULNEREBILITY
28.1.25 Noma Research discovers RCE vulnerability in AI Noma Research discovers RCE vulnerability in AI-development platform, Lightning AI VULNEREBILITY AI
28.1.25 CVE-2024-55417  An arbitrary file write vulnerability in the "/admin/media/upload" endpoint VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2024-55416 A reflected cross-site scripting (XSS) vulnerability in the "/admin/compass" endpoint VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2024-55415 An arbitrary file leak and deletion vulnerability VULNEREBILITY VULNEREBILITY
28.1.25 CVE-2024-41710 (CVSS score: 6.8), a case of command injection in the boot process that could allow a malicious actor to execute arbitrary commands within the context of the phone. VULNEREBILITY VULNEREBILITY
28.1.25 Operation Phantom Circuit North Korea’s Global Data Exfiltration Campaign OPERATION OPERATION
28.1.25 Uncovering New Classes of Kernel Vulnerabiliti Uncovering New Classes of Kernel Vulnerabiliti PAPERS PAPERS
27.1.25 GTA VI Hype Exploited: Malware Masquerades as Early Alpha Access The hype surrounding popular games often becomes a breeding ground for cybercrime, and Grand Theft Auto VI is no exception. A highly anticipated next installment in Rockstar Games' iconic open-world action-adventure series. Officially announced in December 2023, the game is set to release in late 2025 for PlayStation and Xbox. ALERTS EXPLOIT
27.1.25 Phishing Campaign Targets Workplace Anxiety: Email Credentials at Risk A recent phishing campaign leverages workplace fears and urgency in an attempt to steal email credentials. The attack begins with an email titled "Employment Termination lists and new admin position 2025" and an attached malicious HTML file (Staff Employment Termination listsPDF.html) disguised as an important workplace document. When opened, the attachment displays a fake login page, crafted to resemble a legitimate email login portal. ALERTS PHISHING
27.1.25 CVE-2025-23040 (CVSS score: 6.6) - Maliciously crafted remote URLs could lead to credential leaks in GitHub Desktop VULNEREBILITY VULNEREBILITY
27.1.25 CVE-2024-50338 (CVSS score: 7.4) - Carriage-return character in remote URL allows the malicious repository to leak credentials in Git Credential Manager VULNEREBILITY VULNEREBILITY
27.1.25 CVE-2024-53263 (CVSS score: 8.5) - Git LFS permits retrieval of credentials via crafted HTTP URLs VULNEREBILITY VULNEREBILITY
27.1.25 CVE-2024-53858 (CVSS score: 6.5) - Recursive repository cloning in GitHub CLI can leak authentication tokens to non-GitHub submodule hosts VULNEREBILITY VULNEREBILITY
27.1.25 GamaCopy Love and hate under war: The GamaCopy organization, which imitates the Russian Gamaredon, uses military — related bait to launch attacks on Russia GROUP GROUP
27.1.25 MintsLoader: StealC MintsLoader: StealC and BOINC Delivery MALWARE Loader
25.1.25 FLOP: Breaking the Apple M3 CPU via False Load Output Predictions To bridge the ever-increasing gap between the fast execution speed of modern processors and the long latency of memory accesses, CPU vendors continue to introduce newer and more advanced optimizations. While these optimizations improve performance, research has repeatedly demonstrated that they may also have an adverse impact on security. PAPERS PAPERS
25.1.25 SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon Since Spectre’s initial disclosure in 2018, the difficulty of mitigating speculative execution attacks completely in hardware has led to the proliferation of several new variants and attack surfaces in the past six years. Most of the progeny build on top of the original Spectre attack’s key insight, namely that CPUs can execute the wrong control flow transiently and disclose secrets through side-channel traces when attempting to alleviate control hazards, such as conditional or indirect branches and return statements. PAPERS PAPERS
25.1.25 CVE-2025-22604 Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. VULNEREBILITY VULNEREBILITY
25.1.25 CVE-2024-40891 Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891) VULNEREBILITY VULNEREBILITY
25.1.25 CVE-2024-40890 (CVSS score: 8.8) - A post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request VULNEREBILITY VULNEREBILITY
25.1.25 CVE-2024-40891 (CVSS score: 8.8) - A post-authentication command injection vulnerability in the management commands component that could allow an authenticated attacker to execute OS commands on an affected device via Telnet VULNEREBILITY VULNEREBILITY
25.1.25 CVE-2025-0890 (CVSS score: 9.8) - The use of insecure default credentials for the Telnet function that could allow an attacker to log in to the management interface VULNEREBILITY VULNEREBILITY
25.1.25 UAC-0063 UAC-0063: Cyber Espionage Operation Expanding from Central Asia GROUP GROUP
25.1.25 TorNet New TorNet backdoor seen in widespread campaign MALWARE Backdoor
25.1.25 ESXi Ransomware Attacks ESXi Ransomware Attacks: Stealthy Persistence through SSH Tunneling RANSOMWARE RANSOMWARE
25.1.25 CVE-2025-24085 A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2. VULNEREBILITY VULNEREBILITY
24.1.25 CVE-2024-50603 - Aviatrix Controller RCE vulnerability exploited in the wild CVE-2024-50603 is a critical (CVSS score 10.0) remote code execution vulnerability affecting Aviatrix Controller which has been recently reported as being exploited in the wild. The flaw results due to improper neutralization of user-supplied input and if exploited might allow remote unauthenticated attackers with arbitrary code execution. Product vendor has already addressed this vulnerability in patched versions 7.1.4191 and 7.2.4996.  ALERTS VULNEREBILITY
24.1.25 PhaaS kit Sneaky 2FA Phishing-as-a-service (PhaaS) kit dubbed Sneaky 2FA has been observed targeting Microsoft 365 accounts by sending payment type related emails luring recipients into opening fake receipt PDFs containing a QR code that upon scanning redirects to a Sneaky 2FA phishing page. The phishing pages are hosted on a compromised infrastructure, primarily involving WordPress websites and other domains controlled by the Threat Actor. The bogus authentication page(s) are designed to automatically populate the victim's email address to elevate their appearance of legitimacy. ALERTS PHISHING
24.1.25 LucKY Gh0$t Ransomware A ransomware actor operating under the name LucKY Gh0$t has been observed in the threat landscape. The ransomware they employ is a Chaos variant that appends encrypted files with a .[4 random characters] extension. This threat is being spread via drive-by downloads, disguised as a fake ChatGPT desktop version ("ChatGPT 4.0 Full Version - Premium.zip"). ALERTS RANSOM
23.1.25 Murdoc botnet, a Mirai variant A new Mirai variant dubbed Murdoc botnet has been discovered in a recently observed campaign. The campaign leverages ELF binaries and shell scripts to target various *nix based systems, such as IoT devices and IP cameras, among others. The shell scripts are deployed to the devices to download and execute the Murdoc botnet payloads from the C2 servers. ALERTS BOTNET
22.1.25 Groups targeting users with Email bombing and vishing campaigns Researchers have discovered two groups behind malware campaigns involving email-bombing, Microsoft Teams communication, and remote-control tools. These attacks begin with targeted email-bombing campaigns and continue with the attackers contacting the victims via Teams, posing as IT staff. They then tell the victim they can resolve the recent spam issue by using the Teams screen-sharing option or "Quick Assist." ALERTS GROUP
22.1.25 Nnice Ransomware Nnice is a new ransomware variant recently identified in the wild. The malware encrypts user data and appends “.xdddd” extension to the encrypted files. Beside dropping the ransom note in form of a “Readme.txt" text file, the ransomware also changes the desktop wallpaper to indicate that the user files have been encrypted and ransom is demanded from the victim. ALERTS RANSOM
22.1.25 Silent Lynx: New cyber threat group targeting government and financial entities in Kyrgyzstan A new threat group dubbed Silent Lynx has been discovered targeting organizations in Kyrgyzstan and neighboring countries. The group employs a range of techniques such as malicious email attachments, decoy documents and persistence mechanisms to maintain access to compromised systems. ALERTS GROUP
21.1.25 MintsLoader campaign targets energy sector with StealC and BOINC malware MintsLoader is a sophisticated malware loader that employs advanced techniques to evade detection and enhance its operational effectiveness. Impacted sectors include Electricity, Gas and Oil industries as well as Law firms and Legal service industries all within the U.S. and Europe. The infection process begins when a victim clicks on a link in a phishing email, triggering the download of malicious JScript files, leading to the deployment of secondary payloads like StealC and the Berkeley Open Infrastructure for Network Computing (BOINC) client. The combination of these payloads allows for the consumption of sensitive data from browsers, applications, crypto-wallets, and then the exfiltration to C2 server. ALERTS VIRUS
21.1.25 New Tanzeem Android Malware courtesy of DoNot Team Threat actor APT group known as DoNot Team has been linked to a new Tanzeem Android malware. This malicious Android app primarily uses OneSignal which is a popular customer engagement platform used by organizations to send push notifications, emails, in-app messages, and SMS messages. Once installed the malicious app displays a fake chat screen prompting the victim to click a button named "Start Chat". Doing so triggers a message that instructs the victim to grant permissions to the accessibility services API, thus allowing it to perform various nefarious actions. ALERTS VIRUS
21.1.25 Redtail Cryptocurrency Mining Malware Redtail is an adaptable malware that stealthily installs itself on compromised systems utilizing advanced tactics to persist and exploit systems for unauthorized cryptocurrency mining. It is capable of running on various CPU architectures by utilizing two extra scripts: one script identifies the CPU architecture of the victim system ensuring compatibility for the malware, and a second script removes any other competing crypto-mining software that may already exist on the compromised system. This dual approach tactic maintains persistence and works towards evading detection. ALERTS CRYPTOCURRENCY

20.1.25

PNGPlug loader leveraged for ValleyRAT distribution A new ValleyRAT malware distribution campaign has been reported in the wild. The attackers leverage a new multi-stage loader dubbed PNGPlug within the observed attack chain. The deployed ValleyRAT payload has the functionality for deployed shellcode execution, download of additional arbitrary components, etc. This campaign has been attributed to the Silver Fox APT group and observed to be targeting various companies in several Chinese-speaking regions. ALERTS VIRUS

20.1.25

AIRASHI - a large scale DDoS botnet Airashi is a variant of the Aisiru botnet observed in the wild last year. The botnet is known to be spread via exposed vulnerabilities as well as through exploitation of weak Telnet credentials. Airashi can be used by attackers to conduct a wide variety of DDoS attacks. Several strains of the botnet binaries also support additional functionalities such as command execution or proxy services. ALERTS BOTNET

18.1.25

Threat actors reusing legitimate government documents to deliver malware A malware campaign has been linked to nation state actors targeting countries in Central Asia for information gathering. The attacks utilizes legitimate government documents to deliver the malware. ALERTS VIRUS

18.1.25

CVE-2024-55591 - Fortinet FortiOS Authorization Bypass vulnerability CVE-2024-55591 is a recently discovered authorization bypass vulnerability affecting Fortinet FortiOS and FortiProxy products. Successful exploitation of the flaw could allow remote attackers to obtain super-admin privileges on the vulnerable devices via crafted requests to Node.js websocket module. ALERTS VULNEREBILITY

18.1.25

CVE-2024-12686 - BeyondTrust vulnerability exploited in the wild CVE-2024-12686 is a recently disclosed OS command injection vulnerability affecting BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products. ALERTS VULNEREBILITY

18.1.25

Recent malicious activities of the Fireant APT group Fireant (aka RedDelta, Mustang Panda) advanced persistent threat (APT) group has been targeting Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia in recent campaign spreading an updated variant of the PlugX backdoor. ALERTS APT

18.1.25

Ottercookie observed being used by nation states to steal crypto currency OtterCookie, an infostealer designed to steal crypto currency information, has recently been observed in use by nation state actors. ALERTS CRYPTOCURRENCY

18.1.25

LDAP vulnerability PoC is actually just an infostealer CVE-2024-49113 is a vulnerability affecting Microsoft Windows Lightweight Directory Access Protocol (LDAP) which was patched in December. In a recent campaign, attackers have been observed distributing infostealer malware disguised as proof-of-concept (PoC) code for this vulnerability. The fake PoC leverages dropped/downloaded scripts to exfiltrate system information via FTP. ALERTS VULNEREBILITY

18.1.25

Спроби здійснення кібератак з використанням AnyDesk, нібито, від імені CERT-UA Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA отримано інформацію про непоодинокі випадки спроб підключень до комп'ютерів з використанням програми AnyDesk, нібито, від імені CERT-UA. BATTLEFIELD  UKRAINE BATTLEFIELD  UKRAINE

18.1.25

Insecure Implementation of Tunneling Protocols (GRE/IPIP/4in6/6in4) Tunnelling protocols are an essential part of the Internet and form much of the backbone that modern network infrastructure relies on today. ALERT ALERT

18.1.25

Rsync contains six vulnerabilities Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below. ALERT ALERT

18.1.25

Howyar Reloader UEFI bootloader vulnerable to unsigned software execution The Howyar UEFI Application "Reloader" (32-bit and 64-bit), distributed as part of SysReturn prior to version 10.2.02320240919, is vulnerable to the execution of arbitrary software from a hard-coded path. ALERT ALERT

18.1.25

Planet WGS-804HPT Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch HACKING Hardware

18.1.25

GSocket Gambling Scavenger GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia CAMPAIGN CAMPAIGN

18.1.25

Sneaky 2FA Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service PHISHING PHISHING

18.1.25

Star Blizzard New Star Blizzard spear-phishing campaign targets WhatsApp accounts PHISHING PHISHING

16.1.25

CVE-2024-7344 Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 VULNEREBILITY VULNEREBILITY

16.1.25

NTLMv1 If you think you blocked NTLMv1 in your org, think again VULNEREBILITY VULNEREBILITY

16.1.25

SAP Security Patch Day – January 2025 This post shares information on Security Notes that remediate vulnerabilities discovered in SAP products. SAP strongly recommends that the customer visits the Support Portal and applies patches on priority to protect their SAP landscape. VULNEREBILITY VULNEREBILITY

16.1.25

Google Ads heist The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads CRIME CRIME

16.1.25

Operation 99 Operation 99: North Korea’s Cyber Assault on Software Developers OPERATION OPERATION

16.1.25

NICKEL TAPESTRY NICKEL TAPESTRY Infrastructure Associated with Crowdfunding Scheme GROUP GROUP

16.1.25

Rsync contains six vulnerabilities Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below. VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21311 (CVSS score: 9.8) - Windows NTLM V1 Elevation of Privilege Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21307 (CVSS score: 9.8) - Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21298 (CVSS score: 9.8) - Windows Object Linking and Embedding (OLE) Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21295 (CVSS score: 8.1) - SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21294 (CVSS score: 8.1) - Microsoft Digest Authentication Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21308 Windows Themes Spoofing Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21275 Windows App Package Installer Elevation of Privilege Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21395 Microsoft Access Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21366 Microsoft Access Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2025-21186 Microsoft Access Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2024-57726 A privilege escalation vulnerability that allows an attacker who gains access as a low-privilege technician to elevate their privileges to an admin by taking advantage of missing backend authorization checks VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2024-57728 An arbitrary file upload vulnerability that allows an attacker with SimpleHelpAdmin privileges (or as a technician with admin privileges) to upload arbitrary files anywhere on the SimpleServer host, potentially leading to remote code execution VULNEREBILITY VULNEREBILITY

16.1.25

CVE-2024-57727 An unauthenticated path traversal vulnerability that allows an attacker to download arbitrary files from the SimpleHelp server, including the serverconfig.xml file that contains hashed passwords for the SimpleHelpAdmin account and other local technician accounts VULNEREBILITY VULNEREBILITY

14.1.25

Millions of Accounts Vulnerable due to Google’s OAuth Flaw Millions of Americans can have their data stolen right now because of a deficiency in Google’s “Sign in with Google” authentication flow. If you’ve worked for a startup in the past - especially one that has since shut down - you might be vulnerable. VULNEREBILITY VULNEREBILITY

14.1.25

CVE-2024-55591 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. VULNEREBILITY VULNEREBILITY

14.1.25

UAC-0063 Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations GROUP GROUP

14.1.25

CVE-2024-44243 A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.2. An app may be able to modify protected parts of the file system. VULNEREBILITY VULNEREBILITY

14.1.25

CVE-2024-12686 A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. VULNEREBILITY VULNEREBILITY

14.1.25

CVE-2024-50603 An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. VULNEREBILITY VULNEREBILITY

14.1.25

Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection Recently, we released an article where a credit card skimmer was targeting checkout pages on a Magento site. Now we’ve come across sophisticated credit card skimmer malware while investigating a compromised WordPress website. HACKING HACKING

10.1.25

CVE-2024-55550 - Mitel MiCollab Path Traversal vulnerability VE-2024-55550 is a newly disclosed path traversal vulnerability affecting Mitel MiCollab collaboration tool versions 9.8 SP1 FP2 and earlier. ALERTS VULNEREBILITY

10.1.25

New variant of Banshee Stealer targets macOS users A new and updated variant of the macOS-based infostealer malware dubbed Banshee Stealer has been detected in the wild. ALERTS VIRUS

10.1.25

Funksec Ransomware Funksec (aka Funklocker) is another double-extortion ransomware actor that surfaced in late 2024 and allegedly claimed multiple organizations as victims. ALERTS RANSOM

10.1.25

Latest HexaLocker ransomware attacks leverage Skuld Stealer for data extraction A new updated variant of the Go-based HexaLocker ransomware has been discovered in the wild. The new strain has the functionality to download infostealer malware called Skuld Stealer, in an effort focused on extraction of confidential data from the infected endpoint. ALERTS RANSOM

10.1.25

CVE-2025-0282 - Ivanti Connect Secure vulnerability exploited in zero-day attacks CVE-2025-0282 is a newly disclosed critical (CVSS score 9.0) stack-based buffer overflow vulnerability affecting Ivanti Connect Secure. If successfully exploited, it could allow unauthenticated attackers to execute arbitrary code on the vulnerable instances. ALERTS VULNEREBILITY

10.1.25

Old Oracle WebLogic Deserialization vulnerability (CVE-2020-2883) exploited in the wild CVE-2020-2883 is a 2020 deserialization vulnerability affecting unpatched Oracle WebLogic servers. If successfully exploited, it could allow remote code execution by unauthenticated attackers via specially crafted T3 port network requests. ALERTS VULNEREBILITY

10.1.25

XWorm Middle East Campaign: Fake Mossad Intelligence Reports Used as Lures As tensions in the Middle East remain high, particularly following recent events in Syria, threat actors are exploiting the volatile situation to target organizations and individuals both within the region and globally, leveraging the allure of sensitive intelligence to entice victims. ALERTS VIRUS

10.1.25

FireScam mobile malware FireScam is a mobile malware variant recently discovered in the wild. The malware is distributed via a phishing website and under the disguise of Telegram Premium app. ALERTS VIRUS

10.1.25

KGB Keylogger Targets Companies with Fake Russian Ministry-Themed Emails During the second half of December 2024, an actor has been targeting companies with malicious emails enticing users with a Ministry of Industry and Trade of the Russian Federation (Минпромторг России) social engineering ploy along with the use of a malicious .scr file (Письмо в МНТЦ и ЦРП.scr). ALERTS VIRUS

10.1.25

CVE-2025-0107

(CVSS score: 2.3) - An operating system (OS) command injection vulnerability that enables an authenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0106

(CVSS score: 2.7) - A wildcard expansion vulnerability that allows an unauthenticated attacker to enumerate files on the host file system VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0105

(CVSS score: 2.7) - An arbitrary file deletion vulnerability that enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host file system VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0104

(CVSS score: 4.7) - A reflected cross-site scripting (XSS) vulnerability that enables attackers to execute malicious JavaScript code in the context of an authenticated user's browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to browser-session theft VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0103 (CVSS score: 7.8) - An SQL injection vulnerability that enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys, as well as create and read arbitrary files VULNEREBILITY VULNEREBILITY

10.1.25

Scam Imitates CrowdStrike Hiring Process A newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer. SPAM SPAM

10.1.25

FunkSec FunkSec – Alleged Top Ransomware Group Powered by AI RANSOMWARE AI

10.1.25

CVE-2024-49415 Out-of-bound write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote attackers to execute arbitrary code. VULNEREBILITY VULNEREBILITY

10.1.25

RedDelta Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain GROUP GROUP

10.1.25

Banshee Stealer Cracking the Code: How Banshee Stealer Targets macOS Users MALWARE MacOS

10.1.25

MirrorFace China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. GROUP GROUP

10.1.25

CVE-2024-52875 refers to a carriage return line feed (CRLF) injection attack, paving the way for HTTP response splitting, which could then lead to a cross-site scripting (XSS) flaw. VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0283 A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges. VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2025-0282 A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. VULNEREBILITY VULNEREBILITY

10.1.25

Muddling Malspam Muddling Malspam: The Use of Spoofed Domains in Malicious Spam SPAM SPAM

10.1.25

DNA Sequencer's Vulnerable BIOS Genetic Engineering Meets Reverse Engineering: DNA Sequencer's Vulnerable BIOS VULNEREBILITY VULNEREBILITY

10.1.25

NonEuclid RAT The NonEuclid Remote Access Trojan (RAT) is a type of malicious software that enables unauthorised remote access and control of a victim’s computer, often without their awareness. MALWARE RAT

10.1.25

Gayfemboy Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit. BOTNET Botnet

10.1.25

CVE-2024-41713 (CVSS score: 9.1) - A path traversal vulnerability in Mitel MiCollab that could allow an attacker to gain unauthorized and unauthenticated access VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2024-55550 (CVSS score: 4.4) - A path traversal vulnerability in Mitel MiCollab that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization VULNEREBILITY VULNEREBILITY

10.1.25

CVE-2020-2883 (CVSS score: 9.8) - A security vulnerability in Oracle WebLogic Server that could be exploited by an unauthenticated attacker with network access via IIOP or T3 VULNEREBILITY VULNEREBILITY

7.1.25

EAGERBEE EAGERBEE, with updated and novel components, targets the Middle East MALWARE Backdoor

7.1.25

CVE-2024-9140 (CVSS 4.0 score: 9.3) - A vulnerability allows attackers to exploit special characters to bypass input restrictions, potentially leading to unauthorized command execution VULNEREBILITY VULNEREBILITY

7.1.25

CVE-2024-9138 (CVSS 4.0 score: 8.6) - A hard-coded credentials vulnerability that could allow an authenticated user to escalate privileges and gain root-level access to the system, leading to system compromise, unauthorized modifications, data exposure, or service disruption VULNEREBILITY VULNEREBILITY

5.1.25

FireScam Inside FireScam : An Information Stealer with Spyware Capabilities MALWARE ANDROID

5.1.25

CVE-2024-43405 Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. VULNEREBILITY VULNEREBILITY

4.1.25

SECTOR 2024 SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences. KONFERENCE KONFERENCE

4.1.25

BLACK HAT 2024 EU

Black Hat Briefings (běžně označované jako Black Hat ) je konference o počítačové bezpečnosti , která poskytuje bezpečnostní konzultace, školení a instruktáže hackerům, korporacím a vládním agenturám po celém světě.

KONFERENCE KONFERENCE

4.1.25

VB2024 The annual Virus Bulletin International Conference has been running since 1991, recently celebrating its 25th anniversary. The venue typically alternates between Europe and North America. KONFERENCE KONFERENCE

4.1.25

hitbsecconf2024bkk

HITBSecConf or the Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world.

KONFERENCE KONFERENCE

4.1.25

PLAYFULGHOST Finding Malware: Unveiling PLAYFULGHOST with Google Security Operations MALWARE RAT

4.1.25

Treasury Sanctions Technology Company for Support to Malicious Cyber Group Treasury Sanctions Technology Company for Support to Malicious Cyber Group INCIDENT APT

4.1.25

SwaetRAT We entered a new year, but attack scenarios have not changed (yet). I found a Python script with an interesting behavior and a low Virustotal score (7/61). MALWARE RAT

3.1.25

Nitrogen Ransomware The double-extortion ransomware group known as Nitrogen has been very active over the past four months, targeting organizations across diverse sectors such as construction, financial services, manufacturing, and technology. ALERTS RANSOM

3.1.25

Bad Likert Judge Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability HACKING AI

3.1.25

CVE-2024-49112 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY

3.1.25

CVE-2024-49113 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability VULNEREBILITY VULNEREBILITY

3.1.25

Critical: .NET Install links are changing We are currently making an unexpected change to the way that .NET installers and archives are distributed. VULNEREBILITY VULNEREBILITY

2.1.25

Microsoft 365 Vulnerability Discovery to Resolution: A Critical Microsoft 365 Vulnerability VULNEREBILITY VULNEREBILITY

2.1.25

Quasar RAT Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts MALWARE RAT

1.1.25

DoubleClickjacking is a new variation on this classic theme: instead of relying on a single click, it takes advantage of a double-click sequence. ATTACK Web