Threat

Ukraine Aid Organizations Targeted via Fake Zoom Meetings and Malicious PDF Files

A recent spear-phishing operation, named PhantomCaptcha, has targeted organizations involved in Ukraine’s humanitarian and war relief efforts. Cybersecurity researchers reported that the campaign delivers a remote access trojan (RAT) using WebSocket connections for command-and-control (C2), posing a serious threat to international relief organizations. Scope of the Attack On October 8, 2025, individual members of the […]

Ukraine Aid Organizations Targeted via Fake Zoom Meetings and Malicious PDF Files Read More »

Iran-Linked MuddyWater Targets Over 100 Organizations in Global Espionage Campaign

Iranian-affiliated cyber group MuddyWater has launched a large-scale espionage campaign targeting more than 100 organizations, mainly across the Middle East and North Africa (MENA) region. The group has reportedly used a compromised email account to distribute a backdoor malware called Phoenix, aiming to infiltrate high-value targets and gather intelligence, according to a technical report by

Iran-Linked MuddyWater Targets Over 100 Organizations in Global Espionage Campaign Read More »

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Shortly After Microsoft’s July Patch

Chinese-linked threat actors have quickly exploited the ToolShell security vulnerability in Microsoft SharePoint, targeting multiple organizations across the globe shortly after Microsoft patched the flaw in July 2025. This series of attacks highlights the speed and sophistication of threat actors in leveraging newly disclosed vulnerabilities for espionage and cybercrime. The initial breach affected a telecommunications

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Shortly After Microsoft’s July Patch Read More »

Monolock Ransomware Reportedly Being Sold by Threat Actors on Dark Web Forums

Monolock ransomware has appeared for sale on underground forums, with operators advertising version 1.0 and offering stolen corporate credentials alongside the malware. First observed in late September, the campaign spreads through phishing messages that deliver malicious Microsoft Word documents, which, when opened, trigger an embedded macro to download the ransomware binary from a compromised host.

Monolock Ransomware Reportedly Being Sold by Threat Actors on Dark Web Forums Read More »

New GlassWorm Uses Invisible, Obfuscated Code to Attack VS Code Extensions on OpenVSX Marketplace

Over the last week, cybersecurity experts have observed the rise of GlassWorm, a sophisticated malware campaign that targets VS Code extensions available on the OpenVSX Marketplace. This attack demonstrates a concerning evolution in supply chain security within developer ecosystems. As of October 2025, more than 35,800 installations have been affected, and the number continues to

New GlassWorm Uses Invisible, Obfuscated Code to Attack VS Code Extensions on OpenVSX Marketplace Read More »

Threat Actors Breach Xubuntu Website to Distribute Malicious Windows Executable

Cybercriminals have compromised the official Xubuntu website, redirecting torrent download links to a malicious ZIP archive that delivers Windows-based malware. The attack, detected on October 18, 2025, underscores ongoing security weaknesses in community-managed Linux distribution platforms, particularly as users shift from outdated operating systems. Instead of legitimate Xubuntu ISO torrents, unsuspecting users were offered a

Threat Actors Breach Xubuntu Website to Distribute Malicious Windows Executable Read More »

Cavalry Werewolf APT Targets Multiple Industries Using FoalShell and StallionRAT Malware

Between May and August 2025, a technically advanced threat campaign targeted Russia’s public sector and several critical industries, focusing primarily on energy, mining, and manufacturing, [SEO keywords: Cavalry Werewolf APT, cyber threat, FoalShell, StallionRAT]. Analysts attribute the operations to the group known as Cavalry Werewolf, also tracked as YoroTrooper and Silent Lynx. The attackers used

Cavalry Werewolf APT Targets Multiple Industries Using FoalShell and StallionRAT Malware Read More »

Researchers Uncover PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Cybersecurity analysts at Kaspersky have identified a sophisticated cyber espionage operation called PassiveNeuron, targeting government, financial, and industrial sectors across Asia, Africa, and Latin America. The campaign uses two previously unseen malware families named Neursite and NeuralExecutor, indicating a well-organized threat group focused on stealthy, long-term access. Discovery of PassiveNeuron Campaign Kaspersky first detected traces

Researchers Uncover PassiveNeuron APT Using Neursite and NeuralExecutor Malware Read More »

CISA Adds Five Actively Exploited Vulnerabilities to Catalog Targeting Oracle and Microsoft

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. This update officially confirms that a newly disclosed flaw in Oracle E-Business Suite (EBS) has been weaponized in real-world attacks, posing serious risks to organizations using affected systems. Oracle E-Business Suite Flaws Under Attack

CISA Adds Five Actively Exploited Vulnerabilities to Catalog Targeting Oracle and Microsoft Read More »

Hackers Exploit Citrix Flaw and Deploy Snappybee Malware to Breach European Telecom Network

A European telecommunications company has reportedly fallen victim to a cyberattack linked to a China-based espionage group known as Salt Typhoon. The incident, uncovered by Darktrace, occurred in early July 2025 when the attackers exploited a Citrix NetScaler Gateway vulnerability to gain unauthorized access to the organization’s internal network. Salt Typhoon: A Persistent and Evolving

Hackers Exploit Citrix Flaw and Deploy Snappybee Malware to Breach European Telecom Network Read More »