5 Impactful AWS Vulnerabilities You’re Responsible For

31/03/2025 0 Comments 0 tags

If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

31/03/2025 0 Comments 0 tags

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

31/03/2025 0 Comments 0 tags

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

30/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

29/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone,

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

29/03/2025 0 Comments 0 tags

In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection

28/03/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

28/03/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control

Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity

28/03/2025 0 Comments 0 tags

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps

28/03/2025 0 Comments 0 tags

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. “PJobRAT