You Didn’t Get Phished — You Onboarded the Attacker

08/09/2025 0 Comments 0 tags

When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee, but an attacker in disguise? This isn’t phishing; it’s infiltration

Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign

06/09/2025 0 Comments 0 tags

A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to

Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys

06/09/2025 0 Comments 0 tags

A new set of four malicious packages have been discovered in the npm package registry with capabilities to steal cryptocurrency wallet credentials from Ethereum developers. “The packages masquerade as legitimate

CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation

05/09/2025 0 Comments 0 tags

Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw that has come under active

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

05/09/2025 0 Comments 0 tags

The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. “Available in both Python and C variants, CastleRAT’s

SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild

05/09/2025 0 Comments 0 tags

A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in the wild. The command injection vulnerability, tracked as CVE-2025-42957 (CVSS score:

VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

05/09/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according

Automation Is Redefining Pentest Delivery

05/09/2025 0 Comments 0 tags

Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t

Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries

04/09/2025 0 Comments 0 tags

The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member

GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module

04/09/2025 0 Comments 0 tags

Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and