Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Attack Methodologies | Cyber Threats | Vulnerability Exploitation EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Cybersecurity Threats | Malware Distribution | Software Exploitation SmartLoader malware spread through GitHub repositories
Command-and-Control Frameworks | Cybersecurity Threats | Malware Analysis Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS
Cybersecurity Threats | Malware Evasion Techniques | Ransomware Deployment Strategies HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.
Cybersecurity Mitigations | Exchange Server | Security Vulnerability Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.
Cybersecurity Threats | Malware Development | Ransomware Evolution The ScarCruft hacker group has initiated a new malware campaign that utilizes Rust programming language and the PubNub service.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Browser-Based Attacks | Cross-Platform Threats | Malware Campaigns CAPTCHAgeddon – A New ClickFix Attack Uses Phony CAPTCHA to Distribute Malware
AI-Powered Investigations | Cybersecurity | Identity Threat Protection SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Lazarus Hackers deceive users into thinking their camera or microphone is disabled in order to deploy the PyLangGhost RAT.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Autonomous Malware Classification | Reverse Engineering Tools | Threat Detection Technology Microsoft has introduced Project Ire, an initiative designed to automatically identify malware using artificial intelligence technologies.
Cyber Attacks | Espionage Activities | Malware Families CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.
AI Infrastructure Vulnerabilities | Cybersecurity Threats | Malware Analysis The frequency of cyber attacks targeting AI infrastructure is increasing, with significant vulnerabilities being identified.
Cybersecurity Vulnerabilities | D-Link Devices | Federal Agency Mandates CISA has issued a warning regarding vulnerabilities in D-Link products that are currently being exploited in attacks.
Cybercrime | E-commerce Security | Phishing Attacks Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.
Evasion Techniques | Malware Propagation Methods | Social Engineering Tactics The ClickFix malware campaign takes advantage of CAPTCHAs to facilitate cross-platform infection spread.
AI Technology | Cybersecurity | Malware Detection Microsoft’s Project Ire independently reverse engineers software to detect malware.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Automation in SOCs | Incident Response Efficiency | Threat Analysis How Leading CISOs Manage Their SOCs to Avoid Alert Overload and Ensure No Genuine Incidents are Overlooked
Cybersecurity Threats | Malware Distribution Techniques | Social Engineering Tactics Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | E-commerce Fraud | Phishing and Malware Campaigns A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Financial Fraud | Malware Campaign | Phishing Techniques A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.
Evasion Strategies | Exploitation Techniques | Malware Threats Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Cybersecurity Threats | Malicious Software Techniques | Supply Chain Vulnerabilities Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Advanced Social Engineering Techniques | AI-Enhanced Cyber Attacks | Generative AI in Malware Development Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.