top of page
ALL POSTS
SEC Drops Case Against SolarWinds After Years of Cybersecurity Scrutiny
Key Findings The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer Timothy G. Brown. The SEC alleged in 2023 that SolarWinds and Brown had misled investors about the security practices that led to the 2020 supply chain attack, which was attributed to a Russian state-sponsored threat actor. However, in July 2024, many of these allegations were thrown out by the U.S. District Court for the South
Nov 21, 20252 min read
New Sturnus Banking Trojan Targets WhatsApp, Telegram, and Signal
Key Findings Sturnus is a new Android banking trojan with full device-takeover capabilities It targets secure messaging apps like WhatsApp, Telegram, and Signal to bypass encryption and steal sensitive data Sturnus employs sophisticated techniques like HTML overlays and accessibility-based keylogging to capture on-screen content, including messages, contacts, and credentials The malware enables remote control of infected devices through screen mirroring and a structured UI ma
Nov 21, 20252 min read
How Sturnus Android Trojan Steals Your Encrypted Chats and Hijacks Your Device
Key Findings New Android banking trojan called Sturnus enables credential theft and full device takeover for financial fraud Key differentiator is ability to bypass encrypted messaging on apps like WhatsApp, Telegram, and Signal Captures content directly from device screen after decryption, allowing monitoring of private communications Stages overlay attacks to steal banking credentials and leverages accessibility services for extensive device control Blocks uninstallation at
Nov 20, 20252 min read
Coordinated Crackdown: Five Eyes Target Bulletproof Hosting Providers Enabling Ransomware Operations
Key Findings The U.S. Treasury Department, along with officials from the U.K. and Australia, imposed sanctions on two Russian bulletproof hosting providers and their key personnel. The targeted providers, Media Land and its subsidiaries, are accused of supporting ransomware operations and other cybercrime activities. The sanctions also targeted individuals and companies that helped the previously sanctioned Aeza Group evade sanctions and reconstitute their operations. Cybercr
Nov 20, 20252 min read
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Key Findings A recently disclosed security vulnerability in 7-Zip, CVE-2025-11001 (CVSS score: 7.0), is being actively exploited in the wild. The vulnerability allows remote attackers to execute arbitrary code by exploiting improper handling of symbolic links in ZIP files. Proof-of-concept (PoC) exploits for the flaw have been publicly released, making it essential for 7-Zip users to update to the patched version 25.00 as soon as possible. The vulnerability can only be exploi
Nov 20, 20252 min read
IT threat evolution in Q3 2025. Mobile statistics - Malware News
Key Findings In Q3 2025, Kaspersky Security Network prevented 47 million attacks involving mobile malware, adware, or unwanted software. Trojans were the most widespread mobile malware, affecting 15.78% of attacked users. Over 197,000 malicious installation packages were discovered, including 52,723 associated with mobile banking Trojans and 1,564 identified as mobile ransomware. Background The Kaspersky Security Network (KSN) is a global network for analyzing anonymized thre
Nov 19, 20252 min read
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
Key Findings: Seraphic, the leader in enterprise browser security (SEB) and AI enablement, announced native protection for Electron-based applications. Seraphic is the first and only browser security platform to introduce this capability. Seraphic's technology operates at the core of the browser, enabling it to secure any AI-powered browser and Electron app. Background Seraphic transforms any traditional or AI browser into a secure enterprise browser, delivering real-time pro
Nov 19, 20252 min read
Hackers Exploit Adspect Cloaking and Fake Crypto CAPTCHA in npm Supply Chain Attack
Key Findings Seven npm packages published by a threat actor using the alias "dino_reborn" were found to be part of a highly coordinated malware campaign The packages use Adspect-powered cloaking, anti-analysis JavaScript, and fake CAPTCHA interfaces to funnel unsuspecting victims toward malicious payloads while hiding their activity from security researchers The threat actor built an entire fake website to serve security researchers while real victims are redirected through a
Nov 19, 20252 min read
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2027
Key Findings The cybercriminal supply chain continues to transform, with new specialized roles emerging to enable cybercrime at scale. Threat actor communities will fragment, evolve, and get younger, with an influx of teen cybercriminals using plug-and-play attack kits. The non-human identity (NHI) explosion will fuel hidden risks, as machine credentials proliferate across cloud environments with less protection than human-based credentials. Insider threats will be fueled by
Nov 18, 20253 min read
Microsoft Blocks Massive 15.72 Tbps DDoS Attack from AISURU Botnet
Key Findings Microsoft disclosed that it automatically detected and mitigated a 15.72 Tbps DDoS attack, the largest ever observed in the cloud, targeting a single endpoint in Australia. The attack originated from the AISURU botnet, a Mirai-class IoT botnet powered by nearly 300,000 infected devices, mainly routers, security cameras, and DVR systems. The attack involved massive UDP floods from over 500,000 source IPs across various regions, with minimal spoofing and random sou
Nov 18, 20252 min read
Google Addresses Critical Chrome Vulnerability Actively Exploited in the Wild
Key Findings Google released security updates for Chrome to address two security flaws, including one that is being actively exploited in the wild. The actively exploited vulnerability is CVE-2025-13223, a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could lead to arbitrary code execution or program crashes. Clément Lecigne of Google's Threat Analysis Group (TAG) discovered and reported the flaw on November 12, 2025. Google has not provided de
Nov 18, 20252 min read
Alice Blue Partners with AccuKnox for Regulatory Compliance and Cybersecurity
Key Findings Alice Blue, a prominent brokerage and financial services firm, has partnered with AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), to strengthen its security and compliance frameworks across on-prem and cloud workloads. The partnership was executed through channel partner Airowire. Leveraging AccuKnox's security capabilities, Alice Blue aims to achieve enhanced visibility, automated compliance, and continuous protecti
Nov 17, 20252 min read
RondoDox Exploits Unpatched XWiki Servers to Pull ... - Cybrr
Key Findings: RondoDox botnet malware is targeting unpatched XWiki instances to exploit a critical remote code execution vulnerability (CVE-2025-24893). The vulnerability, with a CVSS score of 9.8, allows any guest user to execute arbitrary code through a request to the "/bin/get/Main/SolrSearch" endpoint. The flaw was patched by XWiki in versions 15.10.11, 16.4.1, and 16.5.0RC1 released in late February 2025. Evidence shows the vulnerability has been exploited in the wild si
Nov 16, 20252 min read
Anthropic: China-Backed Hackers Unleash First Large-Scale Autonomous AI Cyberattack
Key Findings China-linked threat actors used Anthropic's AI system, Claude, to automate and execute a sophisticated espionage campaign in September 2025. The cyberspies leveraged advanced "agentic" capabilities of the AI system, allowing it to act autonomously and perform a range of malicious activities with minimal human oversight. The attack targeted about 30 global organizations across tech, finance, chemicals, and government sectors, succeeding in a few cases. This incide
Nov 16, 20252 min read
North Korean Hackers Weaponize JSON Services for Malware Distribution
Key Findings North Korean threat actors behind the Contagious Interview campaign have adopted a new tactic of using JSON storage services to host and deliver malware. The campaign involves approaching targets on professional networking sites under the pretext of a job assessment or project collaboration, instructing them to download a demo project hosted on platforms like GitHub, GitLab, or Bitbucket. In one such project, a file named "server/config/.config.env" contains a Ba
Nov 15, 20252 min read
Chinese Tech Firm Leak Reportedly Exposes State Linked Cyber Attacks
Key Findings: Major data leak from Chinese security firm Knownsec (aka Chuangyu) in November 2025, with over 12,000 secret files briefly appearing on GitHub. Leak provided a rare insight into China's government-backed hacking tools and operations. The data theft may have occurred as early as 2023, but the files were taken down quickly. Background Knownsec is a prominent player in China's cybersecurity industry, having received a significant investment from Tencent in 2015 and
Nov 15, 20251 min read
Serious AI Bugs Found Exposing Vulnerabilities in Meta, Nvidia, and Microsoft Inference Frameworks
Key Findings Cybersecurity researchers have uncovered critical remote code execution vulnerabilities in major AI inference engines, including those from Meta, Nvidia, Microsoft, and open-source projects like vLLM and SGLang. The vulnerabilities stem from the unsafe use of ZeroMQ (ZMQ) and Python's pickle deserialization, a pattern dubbed "ShadowMQ." The root cause is a vulnerability in Meta's Llama large language model (LLM) framework (CVE-2024-50050) that was patched by the
Nov 15, 20252 min read
Chinese Hackers Exploit Anthropic AI to Orchestrate Automated Cyber Attacks
Key Findings Chinese state-sponsored hackers successfully used Anthropic's AI coding tool, Claude Code, to automate a large-scale cyber espionage campaign targeting about 30 global organizations The hackers manipulated Claude Code to act as an "autonomous cyber attack agent," executing 80-90% of the tactical operations with minimal human involvement The campaign, codenamed GTG-1002, marks the first documented case of a foreign government leveraging AI to fully automate a cybe
Nov 14, 20252 min read
Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Key Findings A critical vulnerability in Fortinet's FortiWeb Web Application Firewall (WAF) product allows unauthenticated attackers to gain administrative-level access. The flaw has been observed actively exploited in the wild since October 2025. A public Proof-of-Concept (PoC) exploit exists, raising the likelihood of widespread exploitation. Organizations using vulnerable versions of FortiWeb are advised to take emergency remediation steps. Background On October 6, 2025, c
Nov 14, 20252 min read
Chrome Extension "Safery" Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
Key Findings Chrome extension "Safery: Ethereum Wallet" is a malicious extension posing as a legitimate crypto wallet The extension is designed to steal users' Ethereum wallet seed phrases The seed phrases are exfiltrated by encoding them into Sui blockchain transactions Background The malicious extension was uploaded to the Chrome Web Store on September 29, 2025 It is still available for download as of November 12, 2025 The extension is ranked fourth in search results for "E
Nov 13, 20251 min read
bottom of page
