Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

31/03/2025 0 Comments 0 tags

The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

31/03/2025 0 Comments 0 tags

Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins,

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

31/03/2025 0 Comments 0 tags

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when

5 Impactful AWS Vulnerabilities You’re Responsible For

31/03/2025 0 Comments 0 tags

If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

31/03/2025 0 Comments 0 tags

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

30/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

29/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone,

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

29/03/2025 0 Comments 0 tags

In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

28/03/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection

28/03/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with