Executive Summary On 2025-11-25, security researcher PetrP.73 released a detailed threat report on CVE-2025-61757, a critical vulnerability affecting Oracle Identity Manager (OIM) versions 12.2.1.4.0 and 14.1.2.1.0. The flaw, rated CVSS 9.8, enables remote code execution by
Continue ReadingAuthor: Tudorel Iancu
TamperedChef Signed Apps Deliver Stealthy Payloads
Threat Overview On November 20, 2025, security firm Sand‑Storm released a detailed threat report titled Cooking up Trouble: How TamperedChef Uses Signed Apps to Deliver Stealthy Payloads. The report, authored by Acronis, documents a global cyber‑espionage
Continue ReadingOctober 2025 Phishing Email Trends Report ASEC
Executive Summary In October 2025, the Association of Threat Prevention (ATIP) and its sister company, the Security Research Institute (SSI), released a comprehensive report titled “October 2025 Trends Report on Phishing Emails – ASEC.” The study
Continue ReadingShadowPad WSUS Remote Code Execution Vulnerability Analysis
Overview The latest threat intelligence release from Sand‑Storm, dated 2025‑11‑19, focuses on a sophisticated attack chain that leverages the newly disclosed Windows Server Update Services (WSUS) remote code execution vulnerability identified as CVE‑2025‑59287. The report, titled
Continue ReadingUNC1549 Threat Analysis Tactics Tools Malware Aerospace Defense
UNC1549 Threat Report Executive Summary UNC1549, an Iranian‑linked threat group, has intensified operations against aerospace, aviation, and defense organizations since mid‑2024. The group deploys a sophisticated mix of phishing, supply‑chain exploitation, and custom malware to infiltrate
Continue ReadingOutlook Macros Threat Analysis
Threat Overview In a recent publication dated November 15, 2025, security researchers at AlienVault released a detailed report on a sophisticated malware family known as NotDoor. The threat actor behind NotDoor leverages Microsoft Outlook macros as
Continue ReadingYurei Ransomware Encryption Analysis Go Builder Insights
Yurei Ransomware Encryption Analysis Go Builder Insights AlienVault released a detailed threat report on November 14 2025 that examines the encryption architecture of the Yurei ransomware family. The analysis focuses on the Go based builder that
Continue ReadingContagious Interview Actors Use JSON Storage for Malware Delivery
Threat Overview The latest threat report from NVISO Labs reveals a significant evolution in the Contagious Interview malware campaign. The attackers, known as the Contagious Interview Actors, have shifted their delivery vector to leverage JSON storage
Continue ReadingFantasy Hub Russian RAT Malware Service
Fantasy Hub Russian RAT Malware Service In a recent publication dated 2025‑11‑10, the threat intelligence community was alerted to a new Android Remote Access Trojan (RAT) known as Fantasy Hub. The malware is being offered as
Continue ReadingBookingcom Phishing Attack Targets Hotels and Guests
Introduction The hospitality sector has long been a lucrative target for cybercriminals due to the wealth of personal and financial data it holds. On 2025-11-07, AlienVault released a detailed threat report titled "Booking.com Phishing Campaign Targeting
Continue Reading