CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

20/03/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense sectors with Dark Crystal RAT (aka DCRat). The campaign, detected earlier this

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

19/03/2025 0 Comments 0 tags

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers

Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia

19/03/2025 0 Comments 0 tags

The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

19/03/2025 0 Comments 0 tags

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer.

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

19/03/2025 0 Comments 0 tags

In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

19/03/2025 0 Comments 0 tags

Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

19/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, tj-actions/changed-files, to its Known Exploited Vulnerabilities (KEV)

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

19/03/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

18/03/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

18/03/2025 0 Comments 0 tags

A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out post-exploitation actions. The vulnerability,