top of page
ALL POSTS
Critical 7-Zip Vulnerability With Public Exploit Requires Immediate Update
Key Findings A critical vulnerability, tracked as CVE-2025-11001, has been discovered in the popular file-compression tool 7-Zip. The flaw, which is a Directory Traversal Remote Code Execution (RCE) vulnerability, has a public exploit available. The vulnerability poses a high-risk warning from the UK's NHS England Digital, though active exploitation has not been observed yet. The issue was discovered by researchers at GMO Flatt Security Inc. and revealed by Trend Micro's Zero
Nov 24, 20252 min read
BadAudio malware: How APT24 scaled its cyberespionage through supply chain attacks
Key Findings China-linked APT24 group used supply-chain attacks and multiple techniques over three years to deploy the BadAudio downloader and additional malware payloads The group shifted from broad web compromises to more advanced techniques targeting Taiwan, including repeated supply-chain attacks through a compromised marketing firm and spear-phishing attacks BadAudio is a custom C++ first-stage downloader that pulls an AES-encrypted payload from a fixed C2 server and run
Nov 23, 20252 min read
China-Linked APT31 Launches Stealthy Cyberattacks on Russian Organizations Using Cloud Services
Key Findings: Between 2024 and 2025, the China-linked advanced persistent threat (APT) group APT31 conducted targeted cyber attacks on the Russian IT sector, particularly companies working as contractors and integrators for government agencies. The attacks were characterized by the use of legitimate cloud services, mainly prevalent in Russia, like Yandex Cloud, for command-and-control (C2) and data exfiltration, in an attempt to blend in with normal traffic and evade detectio
Nov 22, 20252 min read
Grafana Patches Critical SCIM Flaw Enabling Impersonation and Privilege Escalation
Key Findings Grafana has patched a critical vulnerability (CVE-2025-41115) in its SCIM (System for Cross-domain Identity Management) implementation with a CVSS score of 10.0. The flaw could allow a malicious or compromised SCIM client to provision a user with a numeric `externalId`, enabling potential impersonation or privilege escalation under certain configurations. The vulnerability affects Grafana Enterprise versions from 12.0.0 to 12.2.1 and has been addressed in Grafana
Nov 22, 20252 min read
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting ... and More
Key Findings China-nexus threat actor APT24 (also called Pitty Tiger) has been using a previously undocumented malware called BADAUDIO in a nearly 3-year espionage campaign. The campaign has targeted organizations in Taiwan, leveraging tactics like strategic website compromises, supply chain attacks, and targeted phishing. BADAUDIO is a highly obfuscated C++ malware that serves as a first-stage downloader, capable of fetching and executing encrypted payloads from command-and-
Nov 21, 20252 min read
Android Quick Share Finally Supports AirDrop, Courtesy of Google's Rust-Hardened Security
Key Findings: Google has updated its Android Quick Share file transfer service to work natively with Apple's AirDrop on Pixel 10 devices. The cross-platform compatibility is achieved through Google's own implementation, not official collaboration with Apple. The communication channel is built using the memory-safe Rust programming language to enhance security and prevent vulnerabilities. Independent security assessment by NetSPI found the Quick Share AirDrop implementation to
Nov 21, 20252 min read
Salesforce Investigates Potential Customer Data Exposure via Gainsight Apps
Key Findings Salesforce has revoked all access tokens associated with Gainsight integrations and removed the affected apps from the AppExchange. The incident may have enabled unauthorized access to certain Salesforce customers' data through the Gainsight app's connection. Salesforce confirmed the issue is not due to any vulnerability in the Salesforce platform, but is related to the external connection to Salesforce. Gainsight acknowledged disruptions to features that rely on
Nov 21, 20252 min read
SEC Drops Case Against SolarWinds After Years of Cybersecurity Scrutiny
Key Findings The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer Timothy G. Brown. The SEC alleged in 2023 that SolarWinds and Brown had misled investors about the security practices that led to the 2020 supply chain attack, which was attributed to a Russian state-sponsored threat actor. However, in July 2024, many of these allegations were thrown out by the U.S. District Court for the South
Nov 21, 20252 min read
New Sturnus Banking Trojan Targets WhatsApp, Telegram, and Signal
Key Findings Sturnus is a new Android banking trojan with full device-takeover capabilities It targets secure messaging apps like WhatsApp, Telegram, and Signal to bypass encryption and steal sensitive data Sturnus employs sophisticated techniques like HTML overlays and accessibility-based keylogging to capture on-screen content, including messages, contacts, and credentials The malware enables remote control of infected devices through screen mirroring and a structured UI ma
Nov 21, 20252 min read
How Sturnus Android Trojan Steals Your Encrypted Chats and Hijacks Your Device
Key Findings New Android banking trojan called Sturnus enables credential theft and full device takeover for financial fraud Key differentiator is ability to bypass encrypted messaging on apps like WhatsApp, Telegram, and Signal Captures content directly from device screen after decryption, allowing monitoring of private communications Stages overlay attacks to steal banking credentials and leverages accessibility services for extensive device control Blocks uninstallation at
Nov 20, 20252 min read
Coordinated Crackdown: Five Eyes Target Bulletproof Hosting Providers Enabling Ransomware Operations
Key Findings The U.S. Treasury Department, along with officials from the U.K. and Australia, imposed sanctions on two Russian bulletproof hosting providers and their key personnel. The targeted providers, Media Land and its subsidiaries, are accused of supporting ransomware operations and other cybercrime activities. The sanctions also targeted individuals and companies that helped the previously sanctioned Aeza Group evade sanctions and reconstitute their operations. Cybercr
Nov 20, 20252 min read
Global Rise in Cyber-Enabled Kinetic Targeting
Key Findings Nation-states are increasingly using cyber operations to enable and amplify the impact of kinetic military operations The boundaries between cyberattacks and physical, real-world attacks are blurring quickly Cyber-enabled kinetic targeting employs advanced tactics like compromising CCTV systems, maritime platforms, and accessing real-time data streams This represents a fundamental evolution in warfare, where the traditional boundaries between cyber and kinetic op
Nov 20, 20252 min read
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Key Findings A recently disclosed security vulnerability in 7-Zip, CVE-2025-11001 (CVSS score: 7.0), is being actively exploited in the wild. The vulnerability allows remote attackers to execute arbitrary code by exploiting improper handling of symbolic links in ZIP files. Proof-of-concept (PoC) exploits for the flaw have been publicly released, making it essential for 7-Zip users to update to the patched version 25.00 as soon as possible. The vulnerability can only be exploi
Nov 20, 20252 min read
Eurofiber - 10,003 breached accounts - IT Security News
Key Findings Eurofiber France disclosed a data breach of its ticket management platform in November 2025 The breach resulted in the exposure of 10,003 unique email addresses, and a smaller number of names and phone numbers A threat actor claiming responsibility for the breach alleges to have additional, more sensitive data including screenshots, VPN configuration files, credentials, source code, certificates, archives, and SQL backup files Background In November 2025, Eurofib
Nov 20, 20252 min read
IT threat evolution in Q3 2025. Mobile statistics - Malware News
Key Findings In Q3 2025, Kaspersky Security Network prevented 47 million attacks involving mobile malware, adware, or unwanted software. Trojans were the most widespread mobile malware, affecting 15.78% of attacked users. Over 197,000 malicious installation packages were discovered, including 52,723 associated with mobile banking Trojans and 1,564 identified as mobile ransomware. Background The Kaspersky Security Network (KSN) is a global network for analyzing anonymized thre
Nov 19, 20252 min read
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
Key Findings Comet Browser has implemented a hidden MCP API (chrome.perplexity.mcp.addStdioServer) that allows its embedded extensions to execute arbitrary local commands on users' devices, a capability that traditional browsers explicitly prohibit. The MCP API is currently found in the Agentic extension and can be triggered by the perplexity.ai page, creating a covert channel for Comet to access local data and launch commands/apps without user consent. There is limited offic
Nov 19, 20253 min read
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
Key Findings: Seraphic, the leader in enterprise browser security (SEB) and AI enablement, announced native protection for Electron-based applications. Seraphic is the first and only browser security platform to introduce this capability. Seraphic's technology operates at the core of the browser, enabling it to secure any AI-powered browser and Electron app. Background Seraphic transforms any traditional or AI browser into a secure enterprise browser, delivering real-time pro
Nov 19, 20252 min read
CredShields and Checkmarx Collaborate to Enhance Smart Contract Security in Enterprise AppSec
Key Findings CredShields, a leading Web3 security firm, has partnered with Checkmarx, the global leader in agentic AI-powered application security testing. The collaboration aims to bring Web3 security expertise to Checkmarx's enterprise application security platform, addressing the growing need for decentralized security solutions. The partnership will focus on comprehensive security coverage for decentralized applications, smart contracts, and wallets, as well as AI-assiste
Nov 19, 20252 min read
Hackers Exploit Adspect Cloaking and Fake Crypto CAPTCHA in npm Supply Chain Attack
Key Findings Seven npm packages published by a threat actor using the alias "dino_reborn" were found to be part of a highly coordinated malware campaign The packages use Adspect-powered cloaking, anti-analysis JavaScript, and fake CAPTCHA interfaces to funnel unsuspecting victims toward malicious payloads while hiding their activity from security researchers The threat actor built an entire fake website to serve security researchers while real victims are redirected through a
Nov 19, 20252 min read
Critical Flowise Flaw Allows Unauthenticated Remote Access
Key Findings: Flowise, a popular open-source low-code workflow platform, contains a critical vulnerability allowing unauthenticated remote admin takeover. The vulnerability is due to an exposed registration endpoint that can be exploited to gain full administrative control of the Flowise instance. No authentication is required to leverage this flaw, making it trivial for attackers to gain complete control of affected systems. The vulnerability has been assigned the CVE identi
Nov 18, 20252 min read
bottom of page

