From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

28/05/2025 0 Comments 0 tags

Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services,

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

28/05/2025 0 Comments 0 tags

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency

How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

28/05/2025 0 Comments 0 tags

Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

28/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct “exposure points” earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

28/05/2025 0 Comments 0 tags

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

27/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT.

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

27/05/2025 0 Comments 0 tags

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

27/05/2025 0 Comments 0 tags

Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to

AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale

27/05/2025 0 Comments 0 tags

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

27/05/2025 0 Comments 0 tags

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected