This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

07/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that’s equipped to steal a victim’s Ethereum private keys by impersonating popular libraries. The package

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

07/03/2025 0 Comments 0 tags

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a “highly sophisticated, state-sponsored attack,” stating the North Korean threat actors behind the

PHP-CGI RCE Flaw Exploited in Attacks on Japan’s Tech, Telecom, and E-Commerce Sectors

07/03/2025 0 Comments 0 tags

Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025. “The attacker has exploited the vulnerability CVE-2024-4577, a remote code

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

06/03/2025 0 Comments 0 tags

The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT.

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

06/03/2025 0 Comments 0 tags

The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

06/03/2025 0 Comments 0 tags

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability,

Outsmarting Cyber Threats with Attack Graphs

06/03/2025 0 Comments 0 tags

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead,

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

06/03/2025 4 Comments 0 tags

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. “Creating four backdoors facilitates the attackers having multiple points of re-entry

U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations

06/03/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal data and suppress free speech and

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

05/03/2025 0 Comments 0 tags

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain