Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

03/10/2025 0 Comments 0 tags

Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust

Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security

03/10/2025 0 Comments 0 tags

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

03/10/2025 0 Comments 0 tags

A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT.

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

03/10/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

02/10/2025 0 Comments 0 tags

The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor. “Over the past decade, Confucius

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

02/10/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

02/10/2025 0 Comments 0 tags

Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p.

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

02/10/2025 0 Comments 0 tags

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

02/10/2025 0 Comments 0 tags

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results

How to Close Threat Detection Gaps: Your SOC’s Action Plan

02/10/2025 0 Comments 0 tags

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats