Threat Overview Kaspersky's Vulnerability Landscape Analysis for Q4 2024 has been published by CyberHunter_NL, highlighting the most common software vulnerabilities and their exploitation methods. The report is compiled by Alexander Kolesnikov from the University of California,
Continue ReadingAuthor: essadmin
Tech Note – Malicious browser extensions impacting at least 3.2 million users – GitLab Security Tech Notes
In a recent threat report published by CyberHunter_NL on February 25, 2025, a significant cyber threat has been identified involving malicious Chrome extensions. This report highlights the discovery of at least 16 malicious browser extensions that
Continue ReadingUSB Worms: Still Wriggling Onto Under-Protected Computers After All These Years
Threat Overview Report Summary: ThreatDown has published a report detailing the resurgence of USB worms, once thought obsolete but now actively targeting under-protected systems via removable drives. The Jenxcus family is particularly prominent, exploiting weak endpoint
Continue ReadingConfluence Exploit Leads to LockBit Ransomware
Threat Report: Confluence Exploit Leads to LockBit Ransomware\n\nOn February 24, 2025, AlienVault published a threat report detailing an intrusion that began with the exploitation of CVE-2023-22527 on an exposed Windows Confluence server. This led to the
Continue ReadingLightSpy Malware Now Targets Facebook & Instagram Data
Threat Overview The recent threat report published by AlienVault on February 21, 2025, highlights a significant evolution in the LightSpy malware framework. Initially designed to target mobile devices, LightSpy has now expanded its capabilities to compromise
Continue ReadingThe Bleeding Edge of Phishing: darcula-suite 3.0 Enables DIY Phishing of Any Brand | Netcraft
In the ever-evolving landscape of cyber threats, phishing remains one of the most pervasive and dangerous tactics employed by malicious actors. The recent threat report published by CyberHunter_NL on February 21, 2025, sheds light on a
Continue ReadingAPT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
Threat Overview The cybersecurity landscape is constantly evolving, with new threats emerging regularly. One of the latest developments comes from the North Korean-linked threat actor APT-C-28, also known as ScarCruft or APT37. This group has launched
Continue ReadingExploited Vulnerabilities in SimpleHelp, PANOS, and SonicWall Added to CISA’s Catalog – Immediate Mitigation Recommended
In today's rapidly evolving cybersecurity landscape, staying ahead of potential threats is paramount. The latest threat report published by Eric Ford on February 19, 2025, highlights critical vulnerabilities in SimpleHelp, PANOS, and SonicWall products that have
Continue ReadingAmazon Phish Hunts for Security Answers and Payment Information
In the ever-evolving landscape of cyber threats, a new phishing scheme targeting Amazon Prime users has been identified. This sophisticated campaign aims to steal login credentials, verification information, and payment data, making it a significant concern
Continue ReadingAn Update on Fake Updates: Two New Actors, and New Mac Malware | Proofpoint US
In the ever-evolving landscape of cybersecurity, staying ahead of emerging threats is crucial. The latest threat report from Proofpoint, titled 'An Update on Fake Updates: Two New Actors, and New Mac Malware,' sheds light on new
Continue Reading