BLOG 2025  AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

H  January(21) February(46) March(44) April(33) May(35) June(67) July(84) August(73) September(57) October(0) November(59) December(60) 2025 January(29)  February(72)  March(67)  April(108) May(118) June(159) July(143) August(131) September(24)

DATE

NAME

Info

CATEG.

WEB

26.7.25 Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode The Arctic Wolf® Labs team has identified a new campaign by cyber-espionage group Dropping Elephant targeting Turkish defense contractors, specifically a manufacturer of precision-guided missile systems. APT blog Arcticwolf.com
26.7.25 Soco404: Multiplatform Cryptomining Campaign Uses Fake Error Pages to Hide Payload Wiz Research has identified a new iteration of a broader malicious cryptomining campaign, which we’ve dubbed Soco404 (based on the observed payload name, associated domain, and use of fake error pages). Cryptocurrency blog Wiz.io/blog
26.7.25 Uncovering a Stealthy WordPress Backdoor in mu-plugins Recently, our team uncovered a particularly sneaky piece of malware tucked away in a place many WordPress users don’t even know exists: the mu-plugins folder. In fact, back in March, we saw a similar trend with hidden malware in this very directory, as detailed in our post Hidden Malware Strikes Again: MU-Plugins Under Attack. This current infection was designed to be quiet, persistent, and very hard to spot. Malware blog blog.sucuri.net
26.7.25 Beyond Mimo’lette: Tracking Mimo's Expansion to Magento CMS and Docker Through investigations into a string of workload compromises involving ecommerce sites, the Datadog Security Research team discovered that the Mimo threat actor (also known as Mimo'lette), previously known for targeting the Craft content management system (CMS), has evolved its tactics to compromise the Magento ecommerce CMS platform through exploitation of an undetermined PFP-FPM vulnerability. Cryptocurrency blog Securitylabs.datadoghq
26.7.25 ToolShell: Critical SharePoint Zero-Day Exploited in the Wild Symantec products already block CVE-2025-53770 exploit attempts. Vulnerebility blog SYMANTEC BLOG
26.7.25 Small world: The revitalization of small AI models for cybersecurity Sophos X-Ops explores why larger isn’t always better when it comes to solving security challenges with AI AI blog SOPHOS
26.7.25 SharePoint ‘ToolShell’ vulnerabilities being exploited in the wild Sophos X-Ops sees exploitation across multiple customer estates Vulnerebility blog SOPHOS
26.7.25 In-Depth Analysis of an Obfuscated Web Shell Script Detailed analysis of an obfuscated web shell used in a CNI attack. Explores its structure, traffic patterns, and Fortinet’s detection and protection. Hacking blog FORTINET
26.7.25 Inside The ToolShell Campaign FortiGuard Labs uncovers ToolShell, a sophisticated exploit chain targeting Microsoft SharePoint servers using a mix of patched and zero-day CVEs. Learn how attackers deploy GhostWebShell and KeySiphon for stealthy remote code execution and credential theft. Vulnerebility blog FORTINET
26.7.25 A Special Mission to Nowhere Following the Israel-Iran ceasefire, FortiGuard Labs uncovered a phishing campaign posing as a private jet evacuation service from Tel Aviv to New York. Learn how attackers used crisis-driven fear to steal personal and financial data. BigBrother blog FORTINET
26.7.25 Beyond Convenience: Exposing the Risks of VMware vSphere Active Directory Integration Broadcom's VMware vSphere product remains a popular choice for private cloud virtualization, underpinning critical infrastructure. Far from fading, organizations continue to rely heavily on vSphere for stability and control. Vulnerebility blog Google Threat Intelligence
26.7.25 SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know *Updated July 24, 2025 with latest findings from Check Point Research* Key findings: A critical ... Vulnerebility blog Checkpoint
26.7.25 Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target Phishing continues to be a powerful tool in the cyber criminal arsenal. In the second ... Phishing blog Checkpoint
26.7.25 The Week in Vulnerabilities: Time to Exploit Continues to Fall Of more than 900 new vulnerabilities in the last week, nearly 200 already have public Proofs-of-Concept (POC). Vulnerebility blog Cyble
26.7.25 UK Identifies Russian GRU’s “AUTHENTIC ANTICS” Malware in Email Espionage Campaign  The UK linked the AUTHENTIC ANTICS malware to APT 28 and sanctioned GRU units for cyber espionage targeting Microsoft email accounts and hybrid warfare. APT blog Cyble
26.7.25 Australian Cyber Security Centre Warns of an Active Exploit Taking Advantage of Microsoft SharePoint Vulnerability CVE-2025-53770  ACSC warns of active exploits targeting CVE-2025-53770 on on-premises Microsoft SharePoint and urges urgent patching to prevent remote code execution attacks. Vulnerebility blog Cyble
26.7.25 Operation CargoTalon : UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant. Contents Introduction Initial Findings Infection Chain. Technical Analysis Stage 0 – Malicious Email File. Stage 1 – Malicious LNK file. Stage 2 – Looking into the decoy file. Stage 3 – Malicious EAGLET implant. Hunting and Infrastructure. Infrastructural details.... MalwarNe blog Seqrite
26.7.25 RAVEN STEALER UNMASKED: Telegram-Based Data Exfiltration EXECUTIVE SUMMARY Raven Stealer is a modern, lightweight, information-stealing malware developed primarily in Delphi and C++, designed to extract sensitive data from victim Malware blog Cyfirma
26.7.25 ANDROID MALWARE POSING AS INDIAN BANK APPS ANDROID MALWARE POSING AS INDIAN BANK APPS EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering timely intelligence on emerging cyber threats and adversarial tactics Malware blog Cyfirma
26.7.25 CYFIRMA Provides Cybersecurity Platform “DeCYFIR” to Takenaka Corporation for Enhanced Threat and Risk Visibility Takenaka Corporation has defined its vision for 2030 through digital transformation and is advancing reform activities that integrate its digital division with all business units. The Cyber blog Cyfirma
26.7.25 EdskManager RAT: Multi-Stage Malware with HVNC and Evasion Capabilities Executive Summary At CYFIRMA, we are dedicated to providing current insights into prevalent threats and the strategies employed by malicious entities targeting both organizations Malware blog Cyfirma
26.7.25 Revisiting Bare Metal Server Security in the Age of AI The adoption of bare metal cloud services for AI workloads has accelerated significantly, driven by performance requirements that virtualized environments struggle to meet. AI blog Eclypsium
26.7.25 NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods In this report, Proofpoint threat researchers take a deep dive into a widespread Request for Quote (RFQ) scam that involves leveraging common Net financing options (Net 15, 30, 45) to steal a variety of high value electronics and goods. Net financing of 15-90 days is the most common payment terms used by businesses. Spam blog PROOFPOINT
26.7.25 Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat. Malware blog Trend Micro
26.7.25 Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771) CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse. Vulnerebility blog Trend Micro
26.7.25 Citrix NetScaler Devices Memory Leak: CVE-2025-5777 The SonicWall Capture Labs threat research team became aware of a pre-authentication memory leak vulnerability leading to information disclosure in Citrix NetScaler devices assessed its impact and developed mitigation measures. NetScaler ADC and NetScaler Gateway are both networking products from Citrix. NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) are primarily used for optimizing application delivery, enhancing security, and improving user experience across networks. Vulnerebility blog SonicWall
26.7.25 Muddled Libra Threat Assessment: Further-Reaching, Faster, More Impactful Unit 42 has tracked and responded to several waves of intrusion operations conducted by the cybercrime group we track as Muddled Libra (aka Scattered Spider, UNC3944) across different sectors in recent months. This article contains observations on Muddled Libra thus far in 2025 based on our incident response insights. We share defensive recommendations that we have seen organizations use successfully against the threat. We also include what’s likely next for this prolific adversary. APT blog Palo Alto
26.7.25 The Ηоmоgraph Illusion: Not Everything Is As It Seems Since the creation of the internet, email attacks have been the predominant attack vector for spreading malware and gaining initial access to systems and endpoints. One example of an effective email compromise technique is a homograph attack. Attackers use this content manipulation tactic to evade content analysis and trick users by replacing Latin characters with similar-looking characters from other Unicode blocks. Malware blog Palo Alto
26.7.25 Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 25) Unit 42 is tracking high-impact, ongoing threat activity targeting self-hosted Microsoft SharePoint servers. While SaaS environments remain unaffected, self-hosted SharePoint deployments — particularly within government, schools, healthcare (including hospitals) and large enterprise companies — are at immediate risk. Exploit blog Palo Alto
26.7.25 Unmasking the new Chaos RaaS group attacks Cisco Talos Incident Response (Talos IR) recently observed attacks by Chaos, a relatively new ransomware-as-a-service (RaaS) group conducting big-game hunting and double extortion attacks. Ransom blog CISCO TALOS
26.7.25 BRB, pausing for a "Sanctuary Moon" marathon Get to know the real people behind cybersecurity’s front lines. In this week’s newsletter, sci-fi meets reality, humanity powers technology and a few surprises are waiting to be discovered. Cyber blog CISCO TALOS
26.7.25 Meet Hazel Burton In the first Humans of Talos, Amy sits with Hazel Burton — storyteller, security advocate, and all-around Talos legend. Hazel shares her journey from small business entrepreneurship to leading content programs at Talos. Cyber blog CISCO TALOS
26.7.25 MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities Cisco Talos uncovered a stealthy Malware-as-a-Service (MaaS) operation that used fake GitHub accounts to distribute a variety of dangerous payloads and evade security defenses. Malware blog CISCO TALOS
26.7.25 Bloomberg Comdb2 null pointer dereference and denial-of-service vulnerabilities Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Bloomberg Comdb2. Comdb2 is an open source, high-availability database developed by Bloomberg. It supports features such as clustering, transactions, snapshots, and isolation. T Vulnerebility blog CISCO TALOS
26.7.25 ToolShell: Details of CVEs affecting SharePoint servers Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. Vulnerebility blog CISCO TALOS
26.7.25 This is your sign to step away from the keyboard This week, Martin shows how stepping away from the screen can make you a stronger defender, alongside an inside scoop on emerging malware threats. Cyber blog CISCO TALOS
26.7.25 SharePoint under fire: ToolShell attacks hit organizations worldwide The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks APT blog Eset
26.7.25 ToolShell: An all-you-can-eat buffet for threat actors ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities Vulnerebility blog Eset
26.7.25 Rogue CAPTCHAs: Look out for phony verification pages spreading malware Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware Malware blog Eset
26.7.25 Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4) Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product. Cyber blog Eset
26.7.25 CVE-2025-53770 & CVE-2025-53771: Critical On-Prem SharePoint Vulnerabilities Two critical vulnerabilities, tracked as CVE-2025-53770 and CVE-2025-53771, have been discovered in on-premise Microsoft SharePoint.  Vulnerebility blog Cybereason
26.7.25 Critical SharePoint Vulnerabilities Under Active Exploitation On-premises Microsoft SharePoint servers are currently facing high-impact, ongoing threat activity due to a set of critical vulnerabilities, notably CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771. Vulnerebility blog Trelix
26.7.25 Dark Web Roast - June 2025 Edition At Trellix, we think it's important we don’t make cybercriminals seem larger than life or hero-worship them. This roast is about showing the human side of cybercrime and how they mess up, just like anyone else. Cyber blog Trelix
25.7.25 Illusory Wishes: China-nexus APT Targets the Tibetan Community In June 2025, Zscaler ThreatLabz collaborated with TibCERT to investigate two cyberattack campaigns targeting the Tibetan community. APT blog Zscaler
19.7.25 SophosAI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it Sophos’ Ben Gelman and Sean Bergeron will present their research on enhancing command line classification with benign anomalous data at Las Vegas AI blog SOPHOS
19.7.25 NailaoLocker Ransomware’s “Cheese” FortiGuard Labs analyzes NailaoLocker ransomware, a unique variant using SM2 encryption and a built-in decryption function. Learn how it works, why it matters, and how Fortinet protects against it. Ransom blog FORTINET
19.7.25 Improving Cloud Intrusion Detection and Triage with FortiCNAPP Composite FortiCNAPP Composite Alerts link weak signals into clear timelines—helping security teams detect cloud-native threats earlier and triage them faster. Cyber blog FORTINET
19.7.25 Old Miner, New Tricks FortiCNAPP Labs uncovers Lcrypt0rx, a likely AI-generated ransomware variant used in updated H2Miner campaigns targeting cloud resources for Monero mining. AI blog FORTINET
19.7.25 How FortiSandbox 5.0 Detects Dark 101 Ransomware Despite Evasion Techniques Discover how FortiSandbox 5.0 detects Dark 101 ransomware, even with sandbox evasion tactics. Learn how advanced behavioral analysis blocks file encryption, system tampering, and ransom note deployment. Ransom blog FORTINET
19.7.25 FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild Check Point Research identifies how the new social engineering technique, FileFix, is being actively tested ... Hacking blog Checkpoint
19.7.25 Global Cyber Attacks Surge 21% in Q2 2025 — Europe Experiences the Highest Increase of All Regions Global Attacks Continued to Rise, But the Details Tell a Bigger Story Every quarter, Check ... Cyber blog Checkpoint
19.7.25 CSA Issues Alert on Critical VMware Vulnerabilities: Patch Now, Experts Warn Singapore’s Cyber Security Agency alerts critical VMware flaws risking code execution and data leaks. Vulnerebility blog Cyble
19.7.25 Scanception: A QRiosity-Driven Phishing Campaign Cyble analyzes "Scanception", an ongoing quishing campaign using QR codes in PDFs to bypass security, harvest credentials, and evade detection systems. Phishing blog Cyble
19.7.25 Australia Strengthens Cybersecurity for Critical Infrastructure with Adoption of AS IEC 62443 Standards Australia adopts AS IEC 62443 to secure OT systems and critical infrastructure, aligning with its national cyber strategy and six-shield cybersecurity framework. Cyber blog Cyble
19.7.25 The Week in Vulnerabilities: Cyble’s Weekly Cyber Threat Report Reveals New Flaws IT and IoT Ecosystems Cyble’s weekly report reveals 17 critical vulnerabilities, rising IoT attacks, and active malware campaigns targeting global IT infrastructure. IoT blog Cyble
19.7.25 APT PROFILE – FANCY BEAR Fancy Bear, also known as APT28, is a notorious Russian cyberespionage group with a long history of targeting governments, military entities, and other high-value APT blog Cyfirma
19.7.25 CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2) EXECUTIVE SUMMARY CVE‑2025‑5777 is a critical information disclosure vulnerability in Citrix NetScaler ADC and Gateway appliances, caused by unsafe memory handling in the Vulnerebility blog Cyfirma
19.7.25 Android Cryptojacker Disguised as Banking App Exploits Device Lock State The global craze around cryptocurrency has fueled both innovation and exploitation. While many legally chase digital gold, cybercriminals hijack devices to mine it covertly. Recently, we encountered a phishing website impersonating a well-known bank, hosting a fake Android app.... Cryptocurrency blog Seqrite
19.7.25 Vulnerabilities in Netgear Firmware-Based IoT Devices In The Enterprise Netgear (and similar) devices, such as IoT routers, have remained a significant target for vulnerability research and exploitation. This is due to their widespread use in both consumer and enterprise environments, their role as network edge devices, and the persistent challenge of securing firmware and managing patches. With over 500 security advisories released by Netgear, the scale of the problem is undeniable. Vulnerebility blog Eclypsium
19.7.25 Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi Proactive security in a rapidly evolving threat landscape Security blog Trend Micro
19.7.25 CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards. Security blog Trend Micro
19.7.25 Preventing Zero-Click AI Threats: Insights from EchoLeak A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defenses are available to proactively mitigate this emerging AI-native threat. AI blog Trend Micro
19.7.25 Wing FTP Server Remote Code Execution: CVE-2025-47812 The SonicWall Capture Labs threat research team became aware of an open redirect vulnerability in Wing FTP Server, assessed its impact and developed mitigation measures. Wing FTP Server is a cross-platform FTP server software available for Windows, Linux, and macOS. It supports a range of protocols, including FTP, FTPS, HTTP, HTTPS, and SFTP, making it a flexible choice for secure file transfers. Vulnerebility blog SonicWall
19.7.25 Ransomware Delivered Through GitHub: A PowerShell-Powered Attack Recently, the SonicWall Capture Labs threat research team identified a PowerShell-based ransomware variant that is abusing GitHub for its distribution. The malware authors are misusing raw.githubusercontent[.]com, a GitHub domain used to host raw content of unprocessed file versions. Ransom blog SonicWall
19.7.25 RisePro Malware Assembles On-site This week, the SonicWall Capture Labs threat research team analyzed a sample of RisePro malware. This is a Malware-as-a-Service family that excels in stealing data, especially related to cryptocurrency wallets. It is a multi-stage executable with layers of obfuscation, indirect API calls and extensive evasion capabilities in the form of dynamically built file types and process monitoring. Malware blog SonicWall
19.7.25 Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication Since late 2024, Unit 42 researchers have been tracking a cluster of suspicious activity as CL-STA-1020, targeting governmental entities in Southeast Asia. The threat actors behind this cluster of activity have been collecting sensitive information from government agencies, including information about recent tariffs and trade disputes. Hacking blog Palo Alto
19.7.25 Talos IR ransomware engagements and the significance of timeliness in incident response The decision between immediate action and delayed response made the difference between ransomware prevention and complete encryption in these two real-world Talos IR engagements. Ransom blog CISCO TALOS
19.7.25 This is your sign to step away from the keyboard This week, Martin shows how stepping away from the screen can make you a stronger defender, alongside an inside scoop on emerging malware threats. Malware blog CISCO TALOS
19.7.25 MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities Cisco Talos uncovered a stealthy Malware-as-a-Service (MaaS) operation that used fake GitHub accounts to distribute a variety of dangerous payloads and evade security defenses. BigBrother blog CISCO TALOS
19.7.25 Asus and Adobe vulnerabilities Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities each in Asus Armoury Crate and Adobe Acrobat products. Vulnerebility blog CISCO TALOS
19.7.25 Unmasking AsyncRAT: Navigating the labyrinth of forks ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants Malware blog Eset
19.7.25 NoBooze1 Malware Targets TP-Link Routers via CVE-2019-9082 This month we dig into the CVE targeting volumes and trending observed in June 2025. We present a breakdown of the exploits targeting this month’s CVE with the largest upswing in activity: CVE-2023-1389 (TP-Link AX21). Malware blog F5
19.7.25 BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption In this Threat Analysis Report, Cybereason investigates a recently observed BlackSuit ransomware attack and the tools and techniques the threat actors used. Ransom blog Cybereason
19.7.25 Detecting and Visualizing Lateral Movement Attacks with Trellix Helix Connect This blog marks the third installment in our series on detecting and visualizing lateral movement attacks with Trellix Helix Connect. Hacking blog Trelix
19.7.25 Threat Analysis: SquidLoader - Still Swimming Under the Radar A new wave of SquidLoader malware samples are actively targeting financial services institutions in Hong Kong. This sophisticated malware exhibits significant evasion capabilities, achieving near-zero detection rates on VirusTotal at the time of analysis. Malware blog Trelix
16.7.25 GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates On June 2, 2025, EclecticIQ analysts observed the emergence of GLOBAL GROUP, a new Ransomware-as-a-Service (RaaS) brand promoted on the Ramp4u forum by the threat actor known as “$$$”. Ransom blog blog.eclecticiq
16.7.25 Unmasking AsyncRAT: Navigating the labyrinth of forks ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants Malware blog Eset
16.7.25 Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader North Korean threat actors deploy 67 malicious npm packages using the newly discovered XORIndex malware loader. Malware blog socket.dev
16.7.25 Russian hackers manipulate npm to make realistic packages Safety’s malicious package detection identified a malicious npm package today named express-exp. This package was brand new, and had only one version, 1.0.1. Malware blog www.getsafety
12.7.25 Message from Wolf Bot Since early June 2025, Arctic Wolf has observed a search engine optimisation (SEO) poisoning and malvertising campaign promoting malicious websites hosting Trojanized versions of legitimate IT tools such as PuTTY and WinSCP. Malware blog ARTICWOLF
12.7.25 Black Hat SEO Poisoning Search Engine Results For AI | ThreatLabz Zscaler ThreatLabz researchers recently uncovered AI-themed websites designed to spread malware. The threat actors behind these attacks are exploiting the popularity of AI tools like ChatGPT and Luma AI. AI blog ZSCALER
12.7.25 Analysis of TAG-140 Campaign and DRAT V2 Development Targeting Indian Government Organizations During an investigation into a recent TAG-140 campaign targeting Indian government organizations, Insikt Group identified a modified variant of the DRAT remote access trojan (RAT), which we designated as DRAT V2. Malware blog RECORDEDFUTURE
12.7.25 Crypto Wallets Continue to be Drained in Elaborate Social Media Scam Darktrace’s latest research reveals that an evolving social engineering campaign continues to target cryptocurrency users through fake startup companies. Cryptocurrency blog DARKTRACE
12.7.25 Count(er) Strike – Data Inference Vulnerability in ServiceNow Varonis Threat Labs discovered a high severity vulnerability in ServiceNow’s platform that can lead to significant data exposure and exfiltration. Vulnerebility blog VARONIS
12.7.25 GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed Unit 42 researchers uncovered a campaign by an initial access broker (IAB) to exploit leaked Machine Keys — cryptographic keys used on ASP.NET sites — to gain access to targeted organizations. IABs breach organizations and then sell that access to other threat actors. Exploit blog Palo Alto
12.7.25 Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West In the volatile aftermath of the Israel-Iran-USA conflict, a sophisticated cyber threat has re-emerged, targeting organizations across the West. BigBrother blog MORPHISEC
12.7.25 Malicious pull request infects VS Code extension ETHcode, a VS Code extension for Ethereum smart contract development, was compromised following a GitHub pull request. Cryptocurrency blog REVERSINGLABS
12.7.25 Is Cyber the Next Stage of War in the Middle East Conflict? As clashes continue in the Middle East, who are the cyber actors to be aware of? Cyber blog SYMANTEC BLOG
12.7.25 Hacktivist Attacks on Critical Infrastructure Grow as New Groups Emerge Hacktivists are increasingly targeting critical infrastructure, data breaches, and other more sophisticated attack types. Hacking blog Cyble
12.7.25 Phishing, Pivots, and Persistence: A Look into Japan’s Q1 2025 Cyber Threat Landscape JPCERT’s Q1 2025 report reveals a 10% rise in cyber incidents, with phishing making up 87% of confirmed cases. Phishing blog Cyble
12.7.25 Ongoing Phishing Campaign Utilizes LogoKit for Credential Harvesting CRIL analyzes an ongoing LogoKit phishing campaign that pulls brand assets from Clearbit and Google Favicon. Phishing blog Cyble
12.7.25 Direct Memory and Container OOMKilled Errors Recently, we encountered continuous integration (CI) build failures in two of our microservices, caused by Java unit tests. Security blog PROOFPOINT
12.7.25 Catching Smarter Mice with Even Smarter Cats Explore how AI is changing the cat-and-mouse dynamic of cybersecurity, from cracking obfuscation and legacy languages to challenging new malware built with Flutter, Rust, and Delphi. AI blog FORTINET
12.7.25 TRACKING RANSOMWARE : JUNE 2025 EXECUTIVE SUMMARY In June 2025, ransomware attacks targeted critical industries such as professional services, healthcare, and information technology, exploiting their Ransom blog Cyfirma
12.7.25 RENDERSHOCK: WEAPONIZING TRUST IN FILE RENDERING PIPELINES EXECUTIVE SUMMARY RenderShock is a comprehensive zero-click attack strategy that targets passive file preview, indexing, and automation behaviours in modern operating systems and enterprise environments. It leverages built-in trust Malware blog Cyfirma
12.7.25 GitHub Abused to Spread Malware Disguised as Free VPN EXECUTIVE SUMMARY At CYFIRMA, we continuously monitor and investigate emerging cyber threats targeting both organizations and individuals. In this report, we analysed a Malware blog Cyfirma
12.7.25 Microsoft Security Bulletin Coverage for July 2025 Microsoft’s July 2025 Patch Tuesday has 127 vulnerabilities, 53 of which are Elevation of Privilege. The SonicWall Capture Labs threat research team has analyzed and addressed Microsoft’s security advisories for the month of July 2025 and has produced coverage for 12 of the reported vulnerabilities. Vulnerebility blog SonicWall
12.7.25 Unauthenticated File Upload-to-RCE in VvvebJs (CVE-2024-29272) The SonicWall Capture Labs threat research team became aware of the threat CVE-2024-29272, assessed its impact and developed mitigation measures for this vulnerability. Vulnerebility blog SonicWall
12.7.25 Ransomware Delivered Through GitHub: A PowerShell-Powered Attack Recently, the SonicWall Capture Labs threat research team identified a PowerShell-based ransomware variant that is abusing GitHub for its distribution. Ransom blog SonicWall
12.7.25 Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques In late 2024, we discovered a malware variant related to the SLOW#TEMPEST campaign. In this research article, we explore the obfuscation techniques employed by the malware authors. We deep dive into these malware samples and highlight methods and code that can be used to detect and defeat the obfuscation techniques. Malware blog Palo Alto
12.7.25 GoldMelody’s Hidden Chords: Initial Access Broker In-Memory IIS Modules Revealed Unit 42 researchers uncovered a campaign by an initial access broker (IAB) to exploit leaked Machine Keys — cryptographic keys used on ASP.NET sites — to gain access to targeted organizations. IABs breach organizations and then sell that access to other threat actors. Exploit blog Palo Alto
12.7.25 Fix the Click: Preventing the ClickFix Attack Vector In this article, we share hunting tips and mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns we have seen so far in 2025: Hacking blog Palo Alto
11.7.25 BERT Ransomware Group Targets Asia and Europe on Multiple Platforms BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defenses and speed up encryption across platforms. Ransom blog Trend Micro
11.7.25 Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack In March 2025, Apache disclosed CVE-2025-24813, a vulnerability impacting Apache Tomcat. This is a widely used platform that allows Apache web servers to run Java-based web applications. The flaw allows remote code execution, affecting Apache Tomcat versions 9.0.0.M1 to 9.0.98, 10.1.0-M1 to 10.1.34 and 11.0.0-M1 to 11.0.2. Vulnerebility blog Palo Alto
11.7.25 BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption In this Threat Analysis Report, Cybereason investigates a recently observed BlackSuit ransomware attack and the tools and techniques the threat actors used. Ransom blog Cybereason
11.7.25 From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities The DoNot APT group, also identified by various security vendors as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tiger, has been active since at least 2016, and has been attributed by several vendors to have links to India. APT blog Trelix
5.7.25 NSB Alerts the Significant Cybersecurity Risks in China-Made Mobile Applications In recent years, the international community has shown growing concerns over cybersecurity issues deriving from China-developed mobile applications (apps). BigBrother blog nsb.gov.tw
5.7.25 Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open During routine monitoring, the Wiz Research Team observed an exploitation attempt targeting one of our honeypot servers running TeamCity, a popular CI/CD tool. Exploit blog WIZ
5.7.25 RondoDox Unveiled: Breaking Down a New Botnet Threat FortiGuard Labs analyzes RondoDox, a stealthy new botnet targeting TBK DVRs and Four-Faith routers via CVE-2024-3721 and CVE-2024-12856. Learn how it evades detection, establishes persistence, and mimics gaming and VPN traffic to launch DDoS attacks. BotNet blog FORTINET
5.7.25 DCRAT Impersonating the Colombian Government Threat actor impersonates Colombian government to deliver DCRAT via phishing email, using obfuscation, steganography, and PowerShell payload chains. Malware blog FORTINET
5.7.25 Numerous Western Companies May Still Need to Ban FUNNULL Admin Accounts to Comply with U.S. Treasury Sanctions Silent Push Threat Analysts have been mapping the scope of the FUNNULL content delivery network (CDN) and its use of Infrastructure Laundering to hide its infrastructure among major Western cloud providers, such as Amazon and Microsoft, burdening defenders to remain constantly alert to respond and block its accounts. We labeled the threat actor network, “Triad Nexus.” Cyber blog Silent Push
5.7.25 Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands Silent Push Threat Analysts followed a tip from Mexican journalist Ignacio Gómez Villaseñor about a threat actor targeting “Hot Sale 2025,” an annual sales event similar to “Black Friday” in the U.S. Phishing blog Silent Push
5.7.25 Top Ransomware Groups June 2025: Qilin Reclaims Top Spot A look at the top ransomware groups, incidents and developments in June 2025. Ransom blog Cyble
5.7.25 The Week in Vulnerabilities: High-Risk IT and ICS Flaws Flagged by Cyble Cyble threat intelligence researchers identified several high-risk IT and ICS flaws this week, including some under active exploitation. Vulnerebility blog Cyble
5.7.25 Phishing Attack : Deploying Malware on Indian Defense BOSS Linux Executive Summary CYFIRMA has identified a sophisticated cyber-espionage campaign orchestrated by APT36 (also known as Transparent Tribe), a threat actor based in Pakistan. Phishing blog Cyfirma
5.7.25 EXECUTIVE THREAT LANDSCAPE REPORT AUSTRALIA Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber Threat Actors Target Australia?Why Cyber Cyber blog Cyfirma
5.7.25 Fortnightly Vulnerability Summary Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES. Fortnight's Most Impacted Products D-Link | Teamcity | Netbox Fortnightly Vulnerebility blog Cyfirma
5.7.25 Eclypsium Releases Tools for Detecting AMI MegaRAC BMC Vulnerabilities An attacker armed with the latest knowledge of BMC vulnerabilities and exploits is poised to take control of your server(s). Given that one of these vulnerabilities, CVE-2024-54085, was recently added to the CISA KEV, we now know exploitation is happening in the wild. Organizations must inventory IT assets and then determine if a given vulnerability is present. Vulnerebility blog Eclypsium
5.7.25 AI Dilemma: Emerging Tech as Cyber Risk Escalates As AI adoption accelerates, businesses face mounting cyber threats—and urgent choices about secure implementation AI blog Trend Micro
5.7.25 DBatLoader Reloaded: Dual Injection and Resilience The SonicWall Capture Labs threat research team has observed the latest variant of DBatLoader performing a dual injection of Remcos RAT, utilizing two distinct injection techniques. The malware is mainly known for delivering Remcos RAT, but also delivers other malware. Malware blog SonicWall
5.7.25 Pay2Key: First Ransomware Utilizing I2P Network Instead of Tor Pay2Key first emerged in late 2020 and primarily targeted Israeli businesses. It gained attention for its alleged links to Iranian threat actors. Today’s sample, however, is an obvious pivot to a ransomware-as-a-service model, welcoming even the most novice users. What sets it apart is its use of I2P, an anonymous network similar to Tor. Ransom blog SonicWall
5.7.25 Windows Shortcut (LNK) Malware Strategies Attackers are increasingly exploiting Windows shortcut (LNK) files for malware delivery. Our telemetry revealed 21,098 malicious LNK samples in 2023, which surged to 68,392 in 2024. In this article, we present an in-depth investigation of LNK malware, based on analysis of 30,000 recent samples. Malware blog Palo Alto
5.7.25 Apache Under the Lens: Tomcat’s Partial PUT and Camel’s Header Hijack In March 2025, Apache disclosed CVE-2025-24813, a vulnerability impacting Apache Tomcat. This is a widely used platform that allows Apache web servers to run Java-based web applications. The flaw allows remote code execution, affecting Apache Tomcat versions 9.0.0.M1 to 9.0.98, 10.1.0-M1 to 10.1.34 and 11.0.0-M1 to 11.0.2. Vulnerebility blog Palo Alto
5.7.25 A message from Bruce the mechanical shark This Fourth of July, Bruce, the 25-foot mechanical shark from Jaws, shares how his saltwater struggles mirror the need for real-world cybersecurity stress testing. Cyber blog CISCO TALOS
5.7.25 How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3) Cracking the code of cybersecurity careers starts here. What skills and mindset can set you apart? Hear from ESET's Robert Lipovsky as he reveals how to thrive in this fast-paced field. Cyber blog Eset
5.7.25 Task scams: Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.

Spam blog Eset
5.7.25 How government cyber cuts will affect you and your business Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks Cyber blog Eset
5.7.25 Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout Phishing blog Eset
5.7.25 Automagic Reverse Engineering Overall, the required time to analyze a binary goes down with this approach, as a lot of manual tasks have been automated. Being able to run these scripts headless allows you to integrate them into your workflow of choice, making the methodology as flexible as possible. Vulnerebility blog Trelix
5.7.25 The Bug Report - June 2025 Edition Stay cool this summer with June 2025’s top 4 CVEs: RCEs, NTLM exploits, router worms & a Google supply chain flaw. Read now to patch fast and stay safe. Vulnerebility blog Trelix
5.7.25 The Democratization of Phishing: Popularity of PhaaS platforms on the rise PhaaS platforms are democratizing sophisticated phishing attacks, making them cheaper, easier, and more effective for cybercriminals, with AI amplifying their scale. Phishing blog Trelix
4.7.25 June's Dark Gift: The Rise of Qwizzserial Discovered by Group-IB in mid-2024, the Qwizzserial, which was initially not very active, began to spread strongly in Uzbekistan, masquerading as legitimate applications. The malware steals banking information and intercepts 2FA sms, transmitting it to fraudsters via Telegram bots. Malware blog GROUP-IB
4.7.25 How IAS is Fighting Back Against the Shape-Shifting Kaleidoscope Scheme The IAS Threat Lab has uncovered a sophisticated new threat dubbed Kaleidoscope — a deceptive Android ad fraud operation that’s as dynamic as it is dangerous. This scheme hides behind seemingly legitimate apps available on Google Play, while malicious lookalike versions are quietly distributed through third-party app stores. Cyber blog INTERGRALANDS
4.7.25 Satori Threat Intelligence Alert: IconAds Conceals Source of Ad Fraud from Users HUMAN’s Satori Threat Intelligence and Research Team has uncovered and disrupted an operation dubbed IconAds. This scheme centered on a collection of 352 apps which load out-of-context ads on a user’s screen and hide the app icons, making it difficult for a user to identify the culprit app and remove it. Cyber blog HUMANSECURITY
4.7.25 FoxyWallet: 40+ Malicious Firefox Extensions Exposed A large-scale malicious campaign has been uncovered involving dozens of fake Firefox extensions designed to steal cryptocurrency wallet credentials. Cryptocurrency blog KOI SECURITY
3.7.25 Further insights into Ivanti CSA 4.6 vulnerabilities exploitation Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results confirming a worldwide exploitation, that lead to Webshells deployments in September and October 2024. Exploit blog INSIDETHELAB
3.7.25 PDFs: Portable documents, or perfect deliveries for phish? Cisco recently developed and released an update to its brand impersonation detection engine for emails. This new update enhances detection coverage and includes a wider range of brands that are delivered using PDF payloads (or attachments). Phishing blog CISCO TALOS
2.7.25 Okta observes v0 AI tool used to build phishing sites Okta Threat Intelligence has observed threat actors abusing v0, a breakthrough Generative Artificial Intelligence (GenAI) tool created by Vercelopens in a new tab, to develop phishing sites that impersonate legitimate sign-in webpages. AI blog OKTA
2.7.25 10 Things I Hate About Attribution: RomCom vs. TransferLoader Most of the time, delineating activities from distinct clusters and separating cybercrime from espionage can be done based on differing tactics, techniques, and procedures (TTPs), tooling, volume/scale, and targeting. Malware blog PROOFPOINT
1.7.25 Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be OX Security researchers uncover how easy it is for malicious extensions to bypass trust checks and execute code on developer machines. Exploit blog OX SECURITY
1.7.25 Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36) Since 2018, Blind Eagle has targeted Latin American organizations using phishing and RATs. Darktrace detected Blind Eagle activity on a customer network involving C2 connectivity, malicious payload downloads and data exfiltration. APT blog DARKTRACE
1.7.25 Tracing Blind Eagle to Proton66 Trustwave SpiderLabs has assessed with high confidence that the threat group Blind Eagle, aka APT-C-36, is associated with the Russian bulletproof hosting service provider Proton66. APT blog SPIDERLABS BLOG