Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

01/04/2025 0 Comments 0 tags

Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateways, with nearly 24,000 unique IP addresses attempting to access these portals.

Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices

01/04/2025 0 Comments 0 tags

Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating systems. The vulnerabilities in

Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

01/04/2025 0 Comments 0 tags

Apple has been hit with a fine of €150 million ($162 million) by France’s competition watchdog over the implementation of its App Tracking Transparency (ATT) privacy framework. The Autorité de

Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

31/03/2025 0 Comments 0 tags

The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

31/03/2025 0 Comments 0 tags

Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins,

5 Impactful AWS Vulnerabilities You’re Responsible For

31/03/2025 0 Comments 0 tags

If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

31/03/2025 0 Comments 0 tags

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

31/03/2025 0 Comments 0 tags

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

30/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

29/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone,