WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

28/04/2025 0 Comments 0 tags

Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead. WordPress

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

28/04/2025 0 Comments 0 tags

Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access. The attacks, first observed by

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

27/04/2025 0 Comments 0 tags

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. “The attack involves

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

26/04/2025 0 Comments 0 tags

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

25/04/2025 0 Comments 0 tags

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat

Why NHIs Are Security’s Most Dangerous Blind Spot

25/04/2025 0 Comments 0 tags

When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

25/04/2025 0 Comments 0 tags

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

25/04/2025 0 Comments 0 tags

Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

25/04/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data,

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

24/04/2025 0 Comments 0 tags

As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. “We continue to see