Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

19/10/2025 0 Comments 0 tags

Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

18/10/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

18/10/2025 0 Comments 0 tags

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

17/10/2025 0 Comments 0 tags

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group

Identity Security: Your First and Last Line of Defense

17/10/2025 0 Comments 0 tags

The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices

17/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

17/10/2025 0 Comments 0 tags

Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

16/10/2025 0 Comments 0 tags

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

16/10/2025 0 Comments 0 tags

A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

16/10/2025 0 Comments 0 tags

A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking