China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

13/05/2025 0 Comments 0 tags

A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors to target critical infrastructure networks. “Actors leveraged CVE-2025-31324, an unauthenticated file upload vulnerability

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

13/05/2025 0 Comments 0 tags

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor’s targeting beyond Russia. Enterprise security

Deepfake Defense in the Age of AI

13/05/2025 0 Comments 0 tags

The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large language models (LLMs) to impersonate trusted individuals and automate these social engineering tactics

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

13/05/2025 0 Comments 0 tags

Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. “He is wanted internationally for committing

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

13/05/2025 0 Comments 0 tags

A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. “These

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

12/05/2025 0 Comments 0 tags

ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

12/05/2025 0 Comments 0 tags

What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks—because cybercriminals are rethinking what counts as “infrastructure.” Instead

The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

12/05/2025 0 Comments 0 tags

Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian’s State of Secrets Sprawl

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

12/05/2025 0 Comments 0 tags

Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users into downloading an information stealer malware dubbed Noodlophile. “Instead of relying on traditional

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

10/05/2025 0 Comments 0 tags

Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked to the eXch cryptocurrency exchange over allegations of money laundering and operating a