Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

18/02/2025 0 Comments 0 tags

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

18/02/2025 0 Comments 0 tags

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

18/02/2025 0 Comments 0 tags

The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024.

Debunking the AI Hype: Inside Real Hacker Tactics

18/02/2025 0 Comments 0 tags

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs’ Red Report 2025 which

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

18/02/2025 0 Comments 0 tags

Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

18/02/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

17/02/2025 0 Comments 0 tags

Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. “Its first known variant since 2022,

CISO’s Expert Guide To CTEM And Why It Matters

17/02/2025 0 Comments 0 tags

Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

17/02/2025 0 Comments 0 tags

South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

17/02/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware,