Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

25/07/2025 0 Comments 0 tags

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamed Soco404 and

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

24/07/2025 0 Comments 0 tags

Virtualization and networking infrastructure have been targeted by a threat actor codenamed Fire Ant as part of a prolonged cyber espionage campaign. The activity, observed this year, is primarily designed

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

24/07/2025 0 Comments 0 tags

Mitel has released security updates to address a critical security flaw in MiVoice MX-ONE that could allow an attacker to bypass authentication protections. “An authentication bypass vulnerability has been identified

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

24/07/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new versatile malware loader called CastleLoader that has been put to use in campaigns distributing various information stealers and remote access trojans (RATs).

Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices

24/07/2025 0 Comments 0 tags

Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 Series appliances that could be exploited to achieve remote code execution. 

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community

24/07/2025 0 Comments 0 tags

The Tibetan community has been targeted by a China-nexus cyber espionage group as part of two campaigns conducted last month ahead of the Dalai Lama’s 90th birthday on July 6,

Pentests once a year? Nope. It’s time to build an offensive SOC

24/07/2025 0 Comments 0 tags

You wouldn’t run your blue team once a year, so why accept this substandard schedule for your offensive side? Your cybersecurity teams are under intense pressure to be proactive and

Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them

24/07/2025 0 Comments 0 tags

Is Managing Customer Logins and Data Giving You Headaches? You’re Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let’s be honest, we’re also more careful

Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems

24/07/2025 0 Comments 0 tags

Microsoft has revealed that one of the threat actors behind the active exploitation of SharePoint flaws is deploying Warlock ransomware on targeted systems. The tech giant, in an update shared

Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access

24/07/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the “mu-plugins” directory in WordPress sites to grant threat actors persistent access and allow them to perform arbitrary actions. Must-use