HOT NEWS 2025  January(141)  February(191) March(268) April(349) May(260) June(502) July(272) August(180) September(202) October(252) November(187) December(0)  THREATS YEARS 

DATE

NAME

INFO

CATEGORY

SUBCATE

31.1.25

SparkRAT - a cross-platform modular malware

SparkRAT is a Golang-based modular malware variant initially discovered back in 2022. With its cross-platform support it targets various architectures including Windows, macOS, and Linux. The malware was used in various targeted cyber espionage operations just last year.

ALERTS

VIRUS

31.1.25

Windows Locker ransomware

A new variant of the Windows Locker ransomware has been identified in the wild. The malware encrypts user data and appends .winlocker extension to the locked files. A ransom request is dropped in form of a text file "Readme.txt" with information on how to contact the threat actors and on how to pay the ransom demands. Windows Locker ransomware has the functionality to maintain persistence, disable firewall and task manager as well as to delete backups and volume shadow copies on the compromised machine.

ALERTS

RANSOM

29.1.25

Aquabot v3 - a new Mirai variant in the field

A new Mirai malware variant dubbed Aquabot v3 has been observed in the wild. The malware has been reported to exploit CVE-2024-41710 which is a command injection vulnerability affecting various Mitel devices. The malware is also able to exploit some older vulnerabilities affecting Hadoop YARN or various Linksys devices. Aquabot v3 supports a wide range of architectures including x86 and ARM. Functionality-wise the malware is predominately used for initiating DDoS attacks from the compromised devices.

ALERTS

BOTNET

29.1.25

Recent activities of the GamaCopy threat group

A new malicious activity attributed to the GamaCopy threat group has been reported in the wild. The TTPs utilized by the group share certain degree of overlap with another APT called Core Werewolf and the discovered activity mimics some of the older attacks conducted by the Shuckworm (aka Gamaredon) APT. The attackers leverage self-extracting (SFX) archive files to deliver decoy .PDF documents alongside of UltraVNC remote desktop tool used for remote access to the compromised endpoints.

ALERTS

GROUP

29.1.25

TorNet backdoor

TorNet is a new backdoor variant spread within an ongoing malicious campaign targeting prevalently Germany and Poland. The threat actors responsible have also been distributing various other malware payloads including Agent Tesla and Snake Keylogger. According to the recent Cisco Talos report, the attack chain leverages phishing emails disguised as correspondence from financial institutions and manufacturing or logistics companies.

ALERTS

VIRUS

28.1.25

New Lumma Stealer campaign using fake Captchas

A new malware campaign that leverages fake CAPTCHA verification checks to deliver Lumma Stealer has been observed. This campaign has targeted victims from around the world (Argentina, Colombia, U.S., Philippines etc.) and across various industries (such as financial institutions, healthcare, marketing and telecom organizations).

ALERTS

VIRUS

28.1.25

CVE-2024-50050

Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead.

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2025-22218

(CVSS score: 8.5) - A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2025-22219

(CVSS score: 6.8) - A malicious actor with non-administrative privileges may be able to inject a malicious script that may lead to arbitrary operations as admin user via a stored cross-site scripting (XSS) attack

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2025-22220

(CVSS score: 4.3) - A malicious actor with non-administrative privileges and network access to Aria Operations for Logs API may be able to perform certain operations in the context of an admin user

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2025-22221

(CVSS score: 5.2) - A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2025-22222

(CVSS score: 7.7) - A malicious user with non-administrative privileges may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known

VULNEREBILITY

VULNEREBILITY

28.1.25

Noma Research discovers RCE vulnerability in AI

Noma Research discovers RCE vulnerability in AI-development platform, Lightning AI

VULNEREBILITY

AI

28.1.25

CVE-2024-55417 

An arbitrary file write vulnerability in the "/admin/media/upload" endpoint

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2024-55416

A reflected cross-site scripting (XSS) vulnerability in the "/admin/compass" endpoint

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2024-55415

An arbitrary file leak and deletion vulnerability

VULNEREBILITY

VULNEREBILITY

28.1.25

CVE-2024-41710

(CVSS score: 6.8), a case of command injection in the boot process that could allow a malicious actor to execute arbitrary commands within the context of the phone.

VULNEREBILITY

VULNEREBILITY

28.1.25

Operation Phantom Circuit

North Korea’s Global Data Exfiltration Campaign

OPERATION

OPERATION

28.1.25

Uncovering New Classes of Kernel Vulnerabiliti

Uncovering New Classes of Kernel Vulnerabiliti

PAPERS

PAPERS

27.1.25

GTA VI Hype Exploited: Malware Masquerades as Early Alpha Access

The hype surrounding popular games often becomes a breeding ground for cybercrime, and Grand Theft Auto VI is no exception. A highly anticipated next installment in Rockstar Games' iconic open-world action-adventure series. Officially announced in December 2023, the game is set to release in late 2025 for PlayStation and Xbox.

ALERTS

EXPLOIT

27.1.25

Phishing Campaign Targets Workplace Anxiety: Email Credentials at Risk

A recent phishing campaign leverages workplace fears and urgency in an attempt to steal email credentials. The attack begins with an email titled "Employment Termination lists and new admin position 2025" and an attached malicious HTML file (Staff Employment Termination listsPDF.html) disguised as an important workplace document. When opened, the attachment displays a fake login page, crafted to resemble a legitimate email login portal.

ALERTS

PHISHING

27.1.25

CVE-2025-23040

(CVSS score: 6.6) - Maliciously crafted remote URLs could lead to credential leaks in GitHub Desktop

VULNEREBILITY

VULNEREBILITY

27.1.25

CVE-2024-50338

(CVSS score: 7.4) - Carriage-return character in remote URL allows the malicious repository to leak credentials in Git Credential Manager

VULNEREBILITY

VULNEREBILITY

27.1.25

CVE-2024-53263

(CVSS score: 8.5) - Git LFS permits retrieval of credentials via crafted HTTP URLs

VULNEREBILITY

VULNEREBILITY

27.1.25

CVE-2024-53858

(CVSS score: 6.5) - Recursive repository cloning in GitHub CLI can leak authentication tokens to non-GitHub submodule hosts

VULNEREBILITY

VULNEREBILITY

27.1.25

GamaCopy

Love and hate under war: The GamaCopy organization, which imitates the Russian Gamaredon, uses military — related bait to launch attacks on Russia

GROUP

GROUP

27.1.25

MintsLoader: StealC

MintsLoader: StealC and BOINC Delivery

MALWARE

Loader

25.1.25

FLOP: Breaking the Apple M3 CPU via False Load Output Predictions

To bridge the ever-increasing gap between the fast execution speed of modern processors and the long latency of memory accesses, CPU vendors continue to introduce newer and more advanced optimizations. While these optimizations improve performance, research has repeatedly demonstrated that they may also have an adverse impact on security.

PAPERS

PAPERS

25.1.25

SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon

Since Spectre’s initial disclosure in 2018, the difficulty of mitigating speculative execution attacks completely in hardware has led to the proliferation of several new variants and attack surfaces in the past six years. Most of the progeny build on top of the original Spectre attack’s key insight, namely that CPUs can execute the wrong control flow transiently and disclose secrets through side-channel traces when attempting to alleviate control hazards, such as conditional or indirect branches and return statements.

PAPERS

PAPERS

25.1.25

CVE-2025-22604

Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response.

VULNEREBILITY

VULNEREBILITY

25.1.25

CVE-2024-40891

Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)

VULNEREBILITY

VULNEREBILITY

25.1.25

CVE-2024-40890

(CVSS score: 8.8) - A post-authentication command injection vulnerability in the CGI program that could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request

VULNEREBILITY

VULNEREBILITY

25.1.25

CVE-2024-40891

(CVSS score: 8.8) - A post-authentication command injection vulnerability in the management commands component that could allow an authenticated attacker to execute OS commands on an affected device via Telnet

VULNEREBILITY

VULNEREBILITY

25.1.25

CVE-2025-0890

(CVSS score: 9.8) - The use of insecure default credentials for the Telnet function that could allow an attacker to log in to the management interface

VULNEREBILITY

VULNEREBILITY

25.1.25

UAC-0063

UAC-0063: Cyber Espionage Operation Expanding from Central Asia

GROUP

GROUP

25.1.25

TorNet

New TorNet backdoor seen in widespread campaign

MALWARE

Backdoor

25.1.25

ESXi Ransomware Attacks

ESXi Ransomware Attacks: Stealthy Persistence through SSH Tunneling

RANSOMWARE

RANSOMWARE

25.1.25

CVE-2025-24085

A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.

VULNEREBILITY

VULNEREBILITY

24.1.25

CVE-2024-50603 - Aviatrix Controller RCE vulnerability exploited in the wild

CVE-2024-50603 is a critical (CVSS score 10.0) remote code execution vulnerability affecting Aviatrix Controller which has been recently reported as being exploited in the wild. The flaw results due to improper neutralization of user-supplied input and if exploited might allow remote unauthenticated attackers with arbitrary code execution. Product vendor has already addressed this vulnerability in patched versions 7.1.4191 and 7.2.4996. 

ALERTS

VULNEREBILITY

24.1.25

PhaaS kit Sneaky 2FA

Phishing-as-a-service (PhaaS) kit dubbed Sneaky 2FA has been observed targeting Microsoft 365 accounts by sending payment type related emails luring recipients into opening fake receipt PDFs containing a QR code that upon scanning redirects to a Sneaky 2FA phishing page. The phishing pages are hosted on a compromised infrastructure, primarily involving WordPress websites and other domains controlled by the Threat Actor. The bogus authentication page(s) are designed to automatically populate the victim's email address to elevate their appearance of legitimacy.

ALERTS

PHISHING

24.1.25

LucKY Gh0$t Ransomware

A ransomware actor operating under the name LucKY Gh0$t has been observed in the threat landscape. The ransomware they employ is a Chaos variant that appends encrypted files with a .[4 random characters] extension. This threat is being spread via drive-by downloads, disguised as a fake ChatGPT desktop version ("ChatGPT 4.0 Full Version - Premium.zip").

ALERTS

RANSOM

23.1.25

Murdoc botnet, a Mirai variant

A new Mirai variant dubbed Murdoc botnet has been discovered in a recently observed campaign. The campaign leverages ELF binaries and shell scripts to target various *nix based systems, such as IoT devices and IP cameras, among others. The shell scripts are deployed to the devices to download and execute the Murdoc botnet payloads from the C2 servers.

ALERTS

BOTNET

22.1.25

Groups targeting users with Email bombing and vishing campaigns

Researchers have discovered two groups behind malware campaigns involving email-bombing, Microsoft Teams communication, and remote-control tools. These attacks begin with targeted email-bombing campaigns and continue with the attackers contacting the victims via Teams, posing as IT staff. They then tell the victim they can resolve the recent spam issue by using the Teams screen-sharing option or "Quick Assist."

ALERTS

GROUP

22.1.25

Nnice Ransomware

Nnice is a new ransomware variant recently identified in the wild. The malware encrypts user data and appends “.xdddd” extension to the encrypted files. Beside dropping the ransom note in form of a “Readme.txt" text file, the ransomware also changes the desktop wallpaper to indicate that the user files have been encrypted and ransom is demanded from the victim.

ALERTS

RANSOM

22.1.25

Silent Lynx: New cyber threat group targeting government and financial entities in Kyrgyzstan

A new threat group dubbed Silent Lynx has been discovered targeting organizations in Kyrgyzstan and neighboring countries. The group employs a range of techniques such as malicious email attachments, decoy documents and persistence mechanisms to maintain access to compromised systems.

ALERTS

GROUP

21.1.25

MintsLoader campaign targets energy sector with StealC and BOINC malware

MintsLoader is a sophisticated malware loader that employs advanced techniques to evade detection and enhance its operational effectiveness. Impacted sectors include Electricity, Gas and Oil industries as well as Law firms and Legal service industries all within the U.S. and Europe. The infection process begins when a victim clicks on a link in a phishing email, triggering the download of malicious JScript files, leading to the deployment of secondary payloads like StealC and the Berkeley Open Infrastructure for Network Computing (BOINC) client. The combination of these payloads allows for the consumption of sensitive data from browsers, applications, crypto-wallets, and then the exfiltration to C2 server.

ALERTS

VIRUS

21.1.25

New Tanzeem Android Malware courtesy of DoNot Team

Threat actor APT group known as DoNot Team has been linked to a new Tanzeem Android malware. This malicious Android app primarily uses OneSignal which is a popular customer engagement platform used by organizations to send push notifications, emails, in-app messages, and SMS messages. Once installed the malicious app displays a fake chat screen prompting the victim to click a button named "Start Chat". Doing so triggers a message that instructs the victim to grant permissions to the accessibility services API, thus allowing it to perform various nefarious actions.

ALERTS

VIRUS

21.1.25

Redtail Cryptocurrency Mining Malware

Redtail is an adaptable malware that stealthily installs itself on compromised systems utilizing advanced tactics to persist and exploit systems for unauthorized cryptocurrency mining. It is capable of running on various CPU architectures by utilizing two extra scripts: one script identifies the CPU architecture of the victim system ensuring compatibility for the malware, and a second script removes any other competing crypto-mining software that may already exist on the compromised system. This dual approach tactic maintains persistence and works towards evading detection.

ALERTS

CRYPTOCURRENCY

20.1.25

PNGPlug loader leveraged for ValleyRAT distribution

A new ValleyRAT malware distribution campaign has been reported in the wild. The attackers leverage a new multi-stage loader dubbed PNGPlug within the observed attack chain. The deployed ValleyRAT payload has the functionality for deployed shellcode execution, download of additional arbitrary components, etc. This campaign has been attributed to the Silver Fox APT group and observed to be targeting various companies in several Chinese-speaking regions.

ALERTS

VIRUS

20.1.25

AIRASHI - a large scale DDoS botnet

Airashi is a variant of the Aisiru botnet observed in the wild last year. The botnet is known to be spread via exposed vulnerabilities as well as through exploitation of weak Telnet credentials. Airashi can be used by attackers to conduct a wide variety of DDoS attacks. Several strains of the botnet binaries also support additional functionalities such as command execution or proxy services.

ALERTS

BOTNET

18.1.25

Threat actors reusing legitimate government documents to deliver malware

A malware campaign has been linked to nation state actors targeting countries in Central Asia for information gathering. The attacks utilizes legitimate government documents to deliver the malware.

ALERTS

VIRUS

18.1.25

CVE-2024-55591 - Fortinet FortiOS Authorization Bypass vulnerability

CVE-2024-55591 is a recently discovered authorization bypass vulnerability affecting Fortinet FortiOS and FortiProxy products. Successful exploitation of the flaw could allow remote attackers to obtain super-admin privileges on the vulnerable devices via crafted requests to Node.js websocket module.

ALERTS

VULNEREBILITY

18.1.25

CVE-2024-12686 - BeyondTrust vulnerability exploited in the wild

CVE-2024-12686 is a recently disclosed OS command injection vulnerability affecting BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products.

ALERTS

VULNEREBILITY

18.1.25

Recent malicious activities of the Fireant APT group

Fireant (aka RedDelta, Mustang Panda) advanced persistent threat (APT) group has been targeting Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia in recent campaign spreading an updated variant of the PlugX backdoor.

ALERTS

APT

18.1.25

Ottercookie observed being used by nation states to steal crypto currency

OtterCookie, an infostealer designed to steal crypto currency information, has recently been observed in use by nation state actors.

ALERTS

CRYPTOCURRENCY

18.1.25

LDAP vulnerability PoC is actually just an infostealer

CVE-2024-49113 is a vulnerability affecting Microsoft Windows Lightweight Directory Access Protocol (LDAP) which was patched in December. In a recent campaign, attackers have been observed distributing infostealer malware disguised as proof-of-concept (PoC) code for this vulnerability. The fake PoC leverages dropped/downloaded scripts to exfiltrate system information via FTP.

ALERTS

VULNEREBILITY

18.1.25

Спроби здійснення кібератак з використанням AnyDesk, нібито, від імені CERT-UA

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA отримано інформацію про непоодинокі випадки спроб підключень до комп'ютерів з використанням програми AnyDesk, нібито, від імені CERT-UA.

BATTLEFIELD  UKRAINE

BATTLEFIELD  UKRAINE

18.1.25

Insecure Implementation of Tunneling Protocols (GRE/IPIP/4in6/6in4)

Tunnelling protocols are an essential part of the Internet and form much of the backbone that modern network infrastructure relies on today.

ALERT

ALERT

18.1.25

Rsync contains six vulnerabilities

Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below.

ALERT

ALERT

18.1.25

Howyar Reloader UEFI bootloader vulnerable to unsigned software execution

The Howyar UEFI Application "Reloader" (32-bit and 64-bit), distributed as part of SysReturn prior to version 10.2.02320240919, is vulnerable to the execution of arbitrary software from a hard-coded path.

ALERT

ALERT

18.1.25

Planet WGS-804HPT

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

HACKING

Hardware

18.1.25

GSocket Gambling Scavenger

GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia

CAMPAIGN

CAMPAIGN

18.1.25

Sneaky 2FA

Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service

PHISHING

PHISHING

18.1.25

Star Blizzard

New Star Blizzard spear-phishing campaign targets WhatsApp accounts

PHISHING

PHISHING

16.1.25

CVE-2024-7344

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

VULNEREBILITY

VULNEREBILITY

16.1.25

NTLMv1

If you think you blocked NTLMv1 in your org, think again

VULNEREBILITY

VULNEREBILITY

16.1.25

SAP Security Patch Day – January 2025

This post shares information on Security Notes that remediate vulnerabilities discovered in SAP products. SAP strongly recommends that the customer visits the Support Portal and applies patches on priority to protect their SAP landscape.

VULNEREBILITY

VULNEREBILITY

16.1.25

Google Ads heist

The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads

CRIME

CRIME

16.1.25

Operation 99

Operation 99: North Korea’s Cyber Assault on Software Developers

OPERATION

OPERATION

16.1.25

NICKEL TAPESTRY

NICKEL TAPESTRY Infrastructure Associated with Crowdfunding Scheme

GROUP

GROUP

16.1.25

Rsync contains six vulnerabilities

Rsync, a versatile file-synchronizing tool, contains six vulnerabilities present within versions 3.3.0 and below.

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21311

(CVSS score: 9.8) - Windows NTLM V1 Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21307

(CVSS score: 9.8) - Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21298

(CVSS score: 9.8) - Windows Object Linking and Embedding (OLE) Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21295

(CVSS score: 8.1) - SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21294

(CVSS score: 8.1) - Microsoft Digest Authentication Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21308

Windows Themes Spoofing Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21275

Windows App Package Installer Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21395

Microsoft Access Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21366

Microsoft Access Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2025-21186

Microsoft Access Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2024-57726

A privilege escalation vulnerability that allows an attacker who gains access as a low-privilege technician to elevate their privileges to an admin by taking advantage of missing backend authorization checks

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2024-57728

An arbitrary file upload vulnerability that allows an attacker with SimpleHelpAdmin privileges (or as a technician with admin privileges) to upload arbitrary files anywhere on the SimpleServer host, potentially leading to remote code execution

VULNEREBILITY

VULNEREBILITY

16.1.25

CVE-2024-57727

An unauthenticated path traversal vulnerability that allows an attacker to download arbitrary files from the SimpleHelp server, including the serverconfig.xml file that contains hashed passwords for the SimpleHelpAdmin account and other local technician accounts

VULNEREBILITY

VULNEREBILITY

14.1.25

Millions of Accounts Vulnerable due to Google’s OAuth Flaw

Millions of Americans can have their data stolen right now because of a deficiency in Google’s “Sign in with Google” authentication flow. If you’ve worked for a startup in the past - especially one that has since shut down - you might be vulnerable.

VULNEREBILITY

VULNEREBILITY

14.1.25

CVE-2024-55591

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

VULNEREBILITY

VULNEREBILITY

14.1.25

UAC-0063

Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations

GROUP

GROUP

14.1.25

CVE-2024-44243

A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.2. An app may be able to modify protected parts of the file system.

VULNEREBILITY

VULNEREBILITY

14.1.25

CVE-2024-12686

A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user.

VULNEREBILITY

VULNEREBILITY

14.1.25

CVE-2024-50603

An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code.

VULNEREBILITY

VULNEREBILITY

14.1.25

Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection

Recently, we released an article where a credit card skimmer was targeting checkout pages on a Magento site. Now we’ve come across sophisticated credit card skimmer malware while investigating a compromised WordPress website.

HACKING

HACKING

10.1.25

CVE-2024-55550 - Mitel MiCollab Path Traversal vulnerability

VE-2024-55550 is a newly disclosed path traversal vulnerability affecting Mitel MiCollab collaboration tool versions 9.8 SP1 FP2 and earlier.

ALERTS

VULNEREBILITY

10.1.25

New variant of Banshee Stealer targets macOS users

A new and updated variant of the macOS-based infostealer malware dubbed Banshee Stealer has been detected in the wild.

ALERTS

VIRUS

10.1.25

Funksec Ransomware

Funksec (aka Funklocker) is another double-extortion ransomware actor that surfaced in late 2024 and allegedly claimed multiple organizations as victims.

ALERTS

RANSOM

10.1.25

Latest HexaLocker ransomware attacks leverage Skuld Stealer for data extraction

A new updated variant of the Go-based HexaLocker ransomware has been discovered in the wild. The new strain has the functionality to download infostealer malware called Skuld Stealer, in an effort focused on extraction of confidential data from the infected endpoint.

ALERTS

RANSOM

10.1.25

CVE-2025-0282 - Ivanti Connect Secure vulnerability exploited in zero-day attacks

CVE-2025-0282 is a newly disclosed critical (CVSS score 9.0) stack-based buffer overflow vulnerability affecting Ivanti Connect Secure. If successfully exploited, it could allow unauthenticated attackers to execute arbitrary code on the vulnerable instances.

ALERTS

VULNEREBILITY

10.1.25

Old Oracle WebLogic Deserialization vulnerability (CVE-2020-2883) exploited in the wild

CVE-2020-2883 is a 2020 deserialization vulnerability affecting unpatched Oracle WebLogic servers. If successfully exploited, it could allow remote code execution by unauthenticated attackers via specially crafted T3 port network requests.

ALERTS

VULNEREBILITY

10.1.25

XWorm Middle East Campaign: Fake Mossad Intelligence Reports Used as Lures

As tensions in the Middle East remain high, particularly following recent events in Syria, threat actors are exploiting the volatile situation to target organizations and individuals both within the region and globally, leveraging the allure of sensitive intelligence to entice victims.

ALERTS

VIRUS

10.1.25

FireScam mobile malware

FireScam is a mobile malware variant recently discovered in the wild. The malware is distributed via a phishing website and under the disguise of Telegram Premium app.

ALERTS

VIRUS

10.1.25

KGB Keylogger Targets Companies with Fake Russian Ministry-Themed Emails

During the second half of December 2024, an actor has been targeting companies with malicious emails enticing users with a Ministry of Industry and Trade of the Russian Federation (Минпромторг России) social engineering ploy along with the use of a malicious .scr file (Письмо в МНТЦ и ЦРП.scr).

ALERTS

VIRUS

10.1.25

CVE-2025-0107

(CVSS score: 2.3) - An operating system (OS) command injection vulnerability that enables an authenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0106

(CVSS score: 2.7) - A wildcard expansion vulnerability that allows an unauthenticated attacker to enumerate files on the host file system

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0105

(CVSS score: 2.7) - An arbitrary file deletion vulnerability that enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host file system

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0104

(CVSS score: 4.7) - A reflected cross-site scripting (XSS) vulnerability that enables attackers to execute malicious JavaScript code in the context of an authenticated user's browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to browser-session theft

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0103

(CVSS score: 7.8) - An SQL injection vulnerability that enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys, as well as create and read arbitrary files

VULNEREBILITY

VULNEREBILITY

10.1.25

Scam Imitates CrowdStrike Hiring Process

A newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer.

SPAM

SPAM

10.1.25

FunkSec

FunkSec – Alleged Top Ransomware Group Powered by AI

RANSOMWARE

AI

10.1.25

CVE-2024-49415

Out-of-bound write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote attackers to execute arbitrary code.

VULNEREBILITY

VULNEREBILITY

10.1.25

RedDelta

Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain

GROUP

GROUP

10.1.25

Banshee Stealer

Cracking the Code: How Banshee Stealer Targets macOS Users

MALWARE

MacOS

10.1.25

MirrorFace

China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019.

GROUP

GROUP

10.1.25

CVE-2024-52875

refers to a carriage return line feed (CRLF) injection attack, paving the way for HTTP response splitting, which could then lead to a cross-site scripting (XSS) flaw.

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0283

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges.

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2025-0282

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

VULNEREBILITY

VULNEREBILITY

10.1.25

Muddling Malspam

Muddling Malspam: The Use of Spoofed Domains in Malicious Spam

SPAM

SPAM

10.1.25

DNA Sequencer's Vulnerable BIOS

Genetic Engineering Meets Reverse Engineering: DNA Sequencer's Vulnerable BIOS

VULNEREBILITY

VULNEREBILITY

10.1.25

NonEuclid RAT

The NonEuclid Remote Access Trojan (RAT) is a type of malicious software that enables unauthorised remote access and control of a victim’s computer, often without their awareness.

MALWARE

RAT

10.1.25

Gayfemboy

Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit.

BOTNET

Botnet

10.1.25

CVE-2024-41713

(CVSS score: 9.1) - A path traversal vulnerability in Mitel MiCollab that could allow an attacker to gain unauthorized and unauthenticated access

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2024-55550

(CVSS score: 4.4) - A path traversal vulnerability in Mitel MiCollab that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization

VULNEREBILITY

VULNEREBILITY

10.1.25

CVE-2020-2883

(CVSS score: 9.8) - A security vulnerability in Oracle WebLogic Server that could be exploited by an unauthenticated attacker with network access via IIOP or T3

VULNEREBILITY

VULNEREBILITY

7.1.25

EAGERBEE

EAGERBEE, with updated and novel components, targets the Middle East

MALWARE

Backdoor

7.1.25

CVE-2024-9140

(CVSS 4.0 score: 9.3) - A vulnerability allows attackers to exploit special characters to bypass input restrictions, potentially leading to unauthorized command execution

VULNEREBILITY

VULNEREBILITY

7.1.25

CVE-2024-9138

(CVSS 4.0 score: 8.6) - A hard-coded credentials vulnerability that could allow an authenticated user to escalate privileges and gain root-level access to the system, leading to system compromise, unauthorized modifications, data exposure, or service disruption

VULNEREBILITY

VULNEREBILITY

5.1.25

FireScam

Inside FireScam : An Information Stealer with Spyware Capabilities

MALWARE

ANDROID

5.1.25

CVE-2024-43405

Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template.

VULNEREBILITY

VULNEREBILITY

4.1.25

SECTOR 2024

SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.

KONFERENCE

KONFERENCE

4.1.25

BLACK HAT 2024 EU

Black Hat Briefings (běžně označované jako Black Hat ) je konference o počítačové bezpečnosti , která poskytuje bezpečnostní konzultace, školení a instruktáže hackerům, korporacím a vládním agenturám po celém světě.

KONFERENCE

KONFERENCE

4.1.25

VB2024

The annual Virus Bulletin International Conference has been running since 1991, recently celebrating its 25th anniversary. The venue typically alternates between Europe and North America.

KONFERENCE

KONFERENCE

4.1.25

hitbsecconf2024bkk

HITBSecConf or the Hack In The Box Security Conference is an annual must attend event in the calendars of security researchers and professionals around the world.

KONFERENCE

KONFERENCE

4.1.25

PLAYFULGHOST

Finding Malware: Unveiling PLAYFULGHOST with Google Security Operations

MALWARE

RAT

4.1.25

Treasury Sanctions Technology Company for Support to Malicious Cyber Group

Treasury Sanctions Technology Company for Support to Malicious Cyber Group

INCIDENT

APT

4.1.25

SwaetRAT

We entered a new year, but attack scenarios have not changed (yet). I found a Python script with an interesting behavior and a low Virustotal score (7/61).

MALWARE

RAT

3.1.25

Nitrogen Ransomware

The double-extortion ransomware group known as Nitrogen has been very active over the past four months, targeting organizations across diverse sectors such as construction, financial services, manufacturing, and technology.

ALERTS

RANSOM

3.1.25

Bad Likert Judge

Bad Likert Judge: A Novel Multi-Turn Technique to Jailbreak LLMs by Misusing Their Evaluation Capability

HACKING

AI

3.1.25

CVE-2024-49112

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

3.1.25

CVE-2024-49113

Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

VULNEREBILITY

VULNEREBILITY

3.1.25

Critical: .NET Install links are changing

We are currently making an unexpected change to the way that .NET installers and archives are distributed.

VULNEREBILITY

VULNEREBILITY

2.1.25

Microsoft 365 Vulnerability

Discovery to Resolution: A Critical Microsoft 365 Vulnerability

VULNEREBILITY

VULNEREBILITY

2.1.25

Quasar RAT

Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts

MALWARE

RAT

1.1.25

DoubleClickjacking

is a new variation on this classic theme: instead of relying on a single click, it takes advantage of a double-click sequence.

ATTACK

Web