BLOG 2025 AI blog APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog 2024 2023H January(21) February(46) H
H January(21) February(46) March(44) April(33) May(35) June(67) July(84) August(73) September(57) October(0) November(59) December(60) 2025 January(29) February(59) March()
DATE |
NAME |
Info |
CATEG. |
WEB |
18.1.25 |
New Star Blizzard spear-phishing campaign targets WhatsApp accounts |
In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a new access vector. |
||
18.1.25 |
IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024 |
Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras. |
||
18.1.25 |
Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR |
This blog discusses a web shell intrusion incident where attackers abused the IIS worker to exfiltrate stolen data. |
||
18.1.25 |
Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. |
|||
18.1.25 |
OverviewThis week, the SonicWall Capture Labs threat research team investigated a sample of GhostRAT malware. This highly infectious file is built to be persistent and thorough, with many anti-analysi... |
|||
18.1.25 |
OverviewThe SonicWall Capture Labs threat research team became aware of a denial-of-service vulnerability in the Windows Lightweight Directory Access (LDAP) Protocol, assessed its impact and developed... |
|||
18.1.25 |
Threat Brief: CVE-2025-0282 and CVE-2025-0283 (Updated Jan. 17) |
On Jan. 8, 2025, Ivanti released a security advisory for two vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in its Connect Secure, Policy Secure and ZTA gateway products. |
||
18.1.25 |
When launching and persisting attacks at scale, threat actors can inadvertently leave behind traces of information. They often reuse, rotate and share portions of their infrastructure when automating their campaign’s setup before launching an attack. |
|||
18.1.25 |
Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application. The Wavlink AC3000 |
|||
18.1.25 |
Microsoft Patch Tuesday for January 2025 — Snort rules and prominent vulnerabilities |
Microsoft has released its monthly security update for January of 2025 which includes 159 vulnerabilities, including 10 that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” |
||
18.1.25 | ||||
18.1.25 |
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 |
The story of a signed UEFI application allowing a UEFI Secure Boot bypass |
||
18.1.25 | ||||
18.1.25 |
Protecting children online: Where Florida’s new law falls short |
Some of the state’s new child safety law can be easily circumvented. Should it have gone further? |
||
11.1.25 |
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit |
Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware. | ||
11.1.25 |
Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. |
|||
11.1.25 |
Trend Micro leads the way by mapping its Container Security detection capabilities to the MITRE ATT&CK framework for Containers and contributing real-world attack data. |
|||
11.1.25 |
Apache Struts Path Traversal to RCE: CVE-2024-53677 |
OverviewThe SonicWall Capture Labs threat research team became aware of an unauthenticated, remote code execution vulnerability in the Apache Struts 2 framework, assessed its impact, and developed mit... |
||
11.1.25 |
The FunkSec ransomware group emerged in late 2024 and published over 85 victims in December, surpassing every other ransomware group that month. | |||
11.1.25 |
Since September, Check Point Research has been monitoring a new version of the Banshee macOS stealer, a malware linked to Russian-speaking cyber criminals targeting macOS users. |
|||
11.1.25 |
Crypto is soaring, but so are threats: Here’s how to keep your wallet safe |
|||
11.1.25 |
APT groups are increasingly deploying ransomware – and that’s bad news for everyone |
|||
11.1.25 | ||||
11.1.25 |
Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike |
The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred in our rapidly evolving cyber landscape. Historically, these groups had distinct motivations: nation-states sought to achieve long-term geopolitical advantages through espionage and intelligence operations, while cybercriminals focused on financial gain, exploiting vulnerabilities for extortion, theft, and fraud. |
||
4.1.25 |
This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation. |
|||
4.1.25 |
In this edition of AI Pulse, let's look back at top AI trends from 2024 in the rear view so we can more clearly predicts AI trends for 2025 and beyond. | |||
4.1.25 | ||||
4.1.25 |
This month in security with Tony Anscombe – December 2024 edition |
|||
4.1.25 |
Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights |
|||