Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

29/05/2025 0 Comments 0 tags

Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech giant, which discovered

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

29/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist,

Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack

28/05/2025 0 Comments 0 tags

The Czech Republic on Wednesday formally accused a threat actor associated with the People’s Republic of China (PRC) of targeting its Ministry of Foreign Affairs. In a public statement, the

Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

28/05/2025 0 Comments 0 tags

An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

28/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that, if successfully exploited, could allow websites to access a user’s entire cloud storage content, as opposed to

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

28/05/2025 0 Comments 0 tags

Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services,

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

28/05/2025 0 Comments 0 tags

Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

28/05/2025 0 Comments 0 tags

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

28/05/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct “exposure points” earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved

How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

28/05/2025 0 Comments 0 tags

Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens