Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

Posted on September 29, 2025September 29, 2025 By CWS

Sep 29, 2025Ravie LakshmananCybersecurity / Hacking Information

Cybersecurity by no means stops—and neither do hackers. Whilst you wrapped up final week, new assaults had been already underway.
From hidden software program bugs to large DDoS assaults and new ransomware methods, this week’s roundup provides you the most important safety strikes to know. Whether or not you are defending key techniques or locking down cloud apps, these are the updates you want earlier than making your subsequent safety choice.
Take a fast look to start out your week knowledgeable and one step forward.
⚡ Risk of the Week
Cisco 0-Day Flaws Below Assault — Cybersecurity companies warned that risk actors have exploited two safety flaws affecting Cisco firewalls as a part of zero-day assaults to ship beforehand undocumented malware households like RayInitiator and LINE VIPER. The RayInitiator and LINE VIPER malware symbolize a big evolution on that used within the earlier marketing campaign, each in sophistication and its potential to evade detection. The exercise entails the exploitation of CVE-2025-20362 (CVSS rating: 6.5) and CVE-2025-20333 (CVSS rating: 9.9) to bypass authentication and execute malicious code on vulnerable home equipment. The marketing campaign is assessed to be linked to a risk cluster dubbed ArcaneDoor, which was attributed to a suspected China-linked hacking group often known as UAT4356 (aka Storm-1849).

🔔 High Information

Nimbus Manticore Makes use of MiniJunk in Vital Infra Assaults — An Iran-linked cyber-espionage group has expanded its operations past its conventional Center Jap searching grounds to focus on essential infrastructure organizations throughout Western Europe utilizing consistently enhancing malware variants and assault ways. Nimbus Manticore, which overlaps with UNC1549 or Smoke Sandstorm, has been noticed concentrating on protection manufacturing, telecommunications, and aviation firms in Denmark, Portugal, and Sweden. Central to the marketing campaign are MiniJunk, an obfuscated backdoor that provides the attacker persistent entry to contaminated techniques, and MiniBrowse, a light-weight stealer with separate variations for stealing credentials from Chrome and Edge browsers. MiniJunk is an up to date model of MINIBIKE (aka SlugResin), with the emails directing victims to pretend job-related login pages that seem like related to firms like Airbus, Boeing, Flydubai, and Rheinmetall. In an additional escalation of its ways, Nimbus Manticore has been noticed utilizing the service SSL.com beginning round Might 2025 to signal their code and cross off malware as reputable software program packages, resulting in a “drastic lower in detections.”
ShadowV2 Targets Docker for DDoS Assaults — A novel ShadowV2 bot marketing campaign is popping distributed denial-of-service (DDoS) assaults right into a full-blown for-hire enterprise by concentrating on misconfigured Docker containers on AWS. As a substitute of counting on prebuilt malicious pictures, the attackers construct containers on the sufferer’s machine itself to launch a Go-based RAT that may launch DDoS assaults. The precise rationale of the strategy is unclear, although Darktrace researchers recommend it might have been a option to cut back forensic traces from importing a malicious container. As soon as put in, the malware sends a heartbeat sign to the C2 server each second, whereas additionally polling for brand new assault instructions each 5 seconds.
Cloudflare Mitigates Largest DDoS Assault on Report — Net efficiency and safety firm Cloudflare mentioned its techniques blocked a record-breaking distributed denial-of-service (DDoS) assault that peaked at 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps), and lasted solely 40 seconds. The assault was geared toward a single IP tackle of an unnamed European community infrastructure firm. It is believed that the assault could also be powered by the AISURU botnet.
Vane Viper Linked to Malicious Campaigns Distributing Malware — A high-volume cybercrime operation often known as Vane Viper that is been energetic for greater than a decade is supported by a business digital promoting platform with a checkered previous. Vane Viper takes benefit of a whole lot of 1000’s of compromised web sites and malicious advertisements that redirect unsuspecting Net customers to locations equivalent to exploit kits, malware, and sketchy web sites. The findings recommend that Vane Viper is just not appearing as an unwitting middleman however is a complicit enabler and energetic participant in malicious operations. It additionally shares parallels with VexTrio Viper in that each emerged from Jap Europe round 2015 and are managed by the Russian diaspora in Europe and Cyprus. “URL Options, Webzilla, and AdTech Holding type a carefully linked trio of corporations: domains registered en masse through a registrar steeped in cybercrime, hosted on infrastructure operated by an organization that is hosted every part from Methbot to state-sponsored disinformation, and payloads delivered through an advert community lengthy implicated in malvertising,” Infoblox mentioned. “Not solely has PropellerAds turned a ‘blind eye’ to felony abuse of their platform, however indicators […] recommend – with moderate-to-high confidence – that a number of ad-fraud campaigns originated from infrastructure attributed to PropellerAds.”
2 New Supermicro BMC Bugs Enable Implanting Malicious Firmware — Servers operating on motherboards offered by Supermicro comprise medium-severity vulnerabilities that may permit hackers to remotely set up malicious firmware that runs even earlier than the working system, offering unprecedented persistence. That mentioned, the caveat is that the risk actor must have administrative entry to the BMC management interface to carry out the replace, or distribute them as a part of a provide chain assault by compromising the servers used to host firmware updates and changing the unique pictures with malicious ones, all whereas protecting the signature legitimate. Supermicro mentioned it has up to date the BMC firmware to mitigate the vulnerabilities, including that it is at the moment testing and validating affected merchandise. The present standing of the replace is unknown.

‎️‍🔥 Trending CVEs
Hackers do not wait. They exploit newly disclosed vulnerabilities inside hours, reworking a missed patch or a hidden bug right into a essential level of failure. One unpatched CVE is all it takes to open the door to a full-scale compromise. Under are this week’s most crucial vulnerabilities, making waves throughout the business. Assessment the listing, prioritize patching, and shut the window of alternative earlier than attackers do.
This week’s listing consists of — CVE-2025-20362, CVE-2025-20333, CVE-2025-20363 (Cisco), CVE-2025-59689 (Libraesva ESG), CVE-2025-20352 (Cisco IOS), CVE-2025-10643, CVE-2025-10644 (Wondershare RepairIt), CVE-2025-7937, CVE-2025-6198 (Supermicro BMC), CVE-2025-9844 (Salesforce CLI), CVE-2025-9125 (Lectora Desktop), CVE-2025-23298 (NVIDIA Merlin), CVE-2025-59545 (DotNetNuke), CVE-2025-34508 (ZendTo), CVE-2025-27888 (Apache Druid Proxy), CVE-2025-10858, CVE-2025-8014 (GitLab), and CVE-2025-54831 (Apache Airflow).

📰 Across the Cyber World

Microsoft Provides ESU for Free within the E.U. — Microsoft has determined to supply free prolonged safety updates for Home windows 10 customers within the European Financial Space (EEA), following stress from the Euroconsumers group. “We’re happy to study that Microsoft will present a no-cost Prolonged Safety Updates (ESU) choice for Home windows 10 client customers within the European Financial Space (EEA),” Euroconsumers mentioned. In different areas, customers might want to both allow Home windows Backup or pay $30 for the 12 months or redeem 1,000 Microsoft Reward factors. It is price noting that Home windows 10 reached finish of assist (EoS) on October 14, 2025.
Olymp Loader Noticed within the Wild — A brand new malware loader known as Olymp Loader has been noticed within the wild, being propagated through GitHub repositories, or via instruments disguised as standard software program equivalent to PuTTY, OpenSSL, Zoom, and even a Counter Strike mod known as Basic Offensive. Written in meeting language, the malware-as-a-service (MaaS) resolution supplies built-in stealer modules, together with a customized model of BrowserSnatch that is out there on GitHub. Campaigns utilizing Olymp have been discovered to ship an array of data stealers and distant entry trojans like Lumma, Raccoon, WebRAT (aka SalatStealer), and Quasar RAT. The instrument was first marketed by a vendor named OLYMPO in HackForums on June 5, 2025, as a botnet, earlier than evolving right into a loader and a crypter. “The malware vendor has printed a roadmap that treats Olymp as a bundle comprising Olymp Botnet, Olymp Loader, Olymp Crypter, an set up service, and a file‑scanning instrument for antivirus testing,” Outpost24 mentioned. “It stays to be seen whether or not OLYMPO can maintain and assist a broader malware product suite over time.” Regardless, the emergence of yet one more bundled crimeware stack can additional decrease the entry barrier for much less skilled risk actors, permitting them to mount widespread campaigns at scale inside a brief period of time.
Malicious Fb Advertisements Result in JSCEAL Malware — Cybersecurity researchers have disclosed an ongoing marketing campaign that is utilizing bogus advertisements on Fb and Google to distribute premium variations of buying and selling platforms like TradingView without spending a dime. In response to Bitdefender, the exercise has additionally expanded to YouTube, the place sponsored advertisements on the platform are getting used to direct customers to malware-laced downloads that steal credentials and compromise accounts. These advertisements are posted through legitimate-but-compromised verified YouTube accounts to serve the advertisements. The attackers take pains to make sure that the hijacked channels mimic the official TradingView channel by reusing the latter’s branding and playlists to construct credibility. An unlisted video uploaded by the rebranded channel, titled “Free TradingView Premium – Secret Technique They Do not Need You to Know,” is estimated to have racked up greater than 182,000 views via aggressive promoting. “The unlisted standing is deliberate, after all. By not being publicly searchable, these malicious movies keep away from informal reporting and platform moderation,” Bitdefender mentioned. “As a substitute, they’re proven completely via advert placements, making certain they attain their targets whereas remaining hidden from public view.” The assaults finally led to the deployment of malware often known as JSCEAL (aka WEEVILPROXY) to steal delicate knowledge.
LockBit 5.0 Analyzed — The risk actors behind the LockBit ransomware have launched a “considerably extra harmful” model, LockBit 5.0, on its sixth anniversary, with superior obfuscation and anti-analysis strategies, whereas being able to concentrating on Home windows, Linux, and ESXi techniques. “The 5.0 model additionally shares code traits with LockBit 4.0, together with an identical hashing algorithms and API decision strategies, confirming that is an evolution of the unique codebase moderately than an imitation,” Pattern Micro mentioned. “The preservation of core functionalities whereas including new evasion strategies demonstrates the group’s technique of incremental enchancment to their ransomware platform.” LockBit might not be essentially the most prolific ransomware group it as soon as was ever since its infrastructure was disrupted in a legislation enforcement operation early final 12 months, however the findings present that it continues to be as aggressive as ever in relation to refining and retooling its ways. “The Home windows binary makes use of heavy obfuscation and packing: it masses its payload via DLL reflection whereas implementing anti-analysis strategies like ETW patching and terminating safety providers,” the corporate mentioned. “In the meantime, the newly found Linux variant maintains related performance with command-line choices for concentrating on particular directories and file sorts. The ESXi variant particularly targets VMware virtualization environments, designed to encrypt total digital machine infrastructures in a single assault.”
Microsoft Blocks Entry to Companies Utilized by Israeli Navy Unit — Microsoft has revealed that it “ceased and disabled” a set of providers to Unit 8200 inside the Israel Ministry of Protection (IMOD) that had been used to allow mass surveillance of civilians in Gaza and the West Financial institution. It mentioned it discovered proof “referring to IMOD consumption of Azure storage capability within the Netherlands and using AI providers.” The secretive contract got here to mild final month following a report by The Guardian, together with +972 Journal and Native Name, that exposed how Microsoft’s Azure service was getting used to retailer and course of tens of millions of Palestinian civilian cellphone calls made every day in Gaza and the West Financial institution. The newspaper reported that the trove of intercepted calls amounted to eight,000 terabytes of knowledge and was held in a Microsoft knowledge heart within the Netherlands. The collected knowledge has been moved in another country and is being deliberate to be transferred to the Amazon Net Companies cloud platform.
Ransomware Teams Use Stolen AWS Keys to Breach Cloud — Ransomware gangs are utilizing Amazon Net Companies (AWS) keys saved in native environments, equivalent to Veeam backup servers, to pivot to a sufferer’s AWS account and steal knowledge with the assistance of the Pacu AWS exploitation framework, turning what began as an on-premise occasion right into a cloud compromise. “Risk actors have gotten more and more adept at exploiting cloud environments — leveraging compromised AWS keys, concentrating on backup servers, and utilizing superior assault frameworks to evade detection,” Varonis mentioned.
Meta Unveils Advert-Free Choice within the U.Ok. — Meta has launched an ad-free expertise for Fb and Instagram within the U.Ok., permitting customers to pay £2.99 a month to entry the platforms with out advertisements on the internet, and £3.99 a month for Android and iOS. “We’ll notify UK customers over the age of 18 that they’ve the selection to subscribe to Fb and Instagram for a payment to make use of these providers with out seeing advertisements,” the corporate mentioned. “A decreased, further payment of £2/month on the internet or £3/month on iOS and Android will routinely apply for every further account listed in a consumer’s Account Heart.” Meta has important hurdles in rolling out the scheme within the E.U., inflicting it to stroll again its advert mannequin, providing customers the selection to obtain “much less customized advertisements” which are full-screen and briefly unskippable. Earlier this Might, the European Fee mentioned the mannequin doesn’t adjust to the Digital Markets Act (DMA) and fined Meta €200 million. In response, the corporate mentioned it will have to make modifications to the mannequin that “might end in a materially worse consumer expertise for European customers and a big influence.” In a report printed in July 2025, privateness non-profit noyb mentioned: “‘Pay or Okay’ has unfold all through the E.U. in recent times and may now be discovered on a whole lot of internet sites. Nonetheless, knowledge safety authorities nonetheless have not adopted a constant E.U.-wide strategy to cope with these techniques. They need to have agreed on this way back.”
Dutch Teen Duo Arrested Over Alleged ‘Wi-Fi Sniffing’ for Russia — Two youngsters have been arrested within the Netherlands on suspicion of espionage, reportedly on behalf of Russian intelligence companies. The boys, each aged 17, had been arrested on Monday. One has been remanded in custody whereas the opposite has been launched on house bail. The arrests are associated to legal guidelines relating to state-sponsored interference, however further particulars have been withheld as a result of age of the suspects and the continuing investigation. The kids are alleged to have been tasked with carrying a “Wi-Fi sniffer” alongside a route previous buildings in The Hague, together with the headquarters of Europol and Eurojust, in addition to a number of embassies.
Akira Ransomware Breaching MFA-Protected SonicWall VPN Accounts — Cybersecurity researchers have warned about an “aggressive” Akira ransomware marketing campaign concentrating on SonicWall VPNs to quickly deploy the locker as a part of an assault wave that started on July 21, 2025. “In virtually all intrusions, ransomware encryption occurred in below 4 hours from preliminary entry, with a staging interval as quick as 55 minutes in some cases,” Arctic Wolf mentioned in a brand new report. Different generally noticed post-exploitation actions embrace inside community scanning, Impacket SMB exercise tied to discovery, Energetic Listing discovery, and VPN shopper logins originating from Digital Non-public Server (VPS) internet hosting suppliers. Focusing on firewall and LDAP-synchronized, a number of intrusions have concerned the risk actors leveraging the devoted account used for Energetic Listing synchronization to log in through SSL VPN, regardless of not being deliberately configured for such entry. In additional than 50% of the analyzed intrusions, login makes an attempt had been noticed towards accounts with the One Time Password (OTP) characteristic enabled. “Malicious logins had been adopted inside minutes by port scanning, Impacket SMB exercise, and speedy deployment of Akira ransomware,” the corporate famous. “Victims spanned throughout a number of sectors and group sizes, suggesting opportunistic mass exploitation.”
4 Individuals to Face Trial Over Greece Adware Scandal — 4 people, two Israeli and two Greek staff of adware vendor Mind, are anticipated to face trial in Greece over using the Predator surveillance instrument by the ruling authorities in 2022 to snoop on judges, senior navy officers, journalists, and the opposition. However up to now, no authorities officers have been charged in reference to the scandal.
Phishing Emails Result in DarkCloud Stealer — The data stealer often known as DarkCloud is being distributed through phishing emails masquerading as monetary correspondence that trick recipients into opening malicious ZIP archives. The stealer, moreover including new layers of encryption and evasion, targets net browser knowledge, keystrokes, FTP credentials, clipboard contents, e mail shoppers, recordsdata, and cryptocurrency wallets. Stolen credentials/knowledge are despatched to attacker-controlled Telegram, FTP, SMTP, or Net Panel (PHP) endpoints. It is marketed on Telegram by a consumer named @BluCoder and on the clearnet via the area darkcloud.onlinewebshop[.]internet. It is marketed because the “greatest surveillance software program for folks, spouses, and employers.” Cybersecurity firm eSentire mentioned: “DarkCloud is an information-stealing malware written in VB6 and is actively being up to date to focus on a variety of purposes, together with e mail shoppers, FTP shoppers, cryptocurrency wallets, net browsers and helps quite a few different information-stealing capabilities like keystroke/clipboard harvesting, clipboard hijacking, and file assortment.”
Nupay Plugs “Configuration Hole” — Indian fintech firm Nupay mentioned it addressed a configuration hole after UpGuard flagged an unprotected Amazon S3 storage bucket containing greater than 270,000 paperwork associated to financial institution transfers of Indian prospects. The uncovered data included checking account numbers, transaction quantities, names, cellphone numbers, and e mail addresses. The info was linked to at the least 38 totally different banks and monetary establishments. It is at the moment not recognized how lengthy the info was left publicly accessible on the web, though misconfigurations of this sort usually are not unusual. Nupay advised TechCrunch the bucket uncovered a “restricted set of check information with primary buyer particulars,” and {that a} majority of the main points had been “dummy or check recordsdata.”
High AI Chatbots Present Solutions with False Claims — Among the prime AI chatbots’ tendency to repeat false claims on matters within the information elevated almost twice as a lot as they did final 12 months, in response to an audit by NewsGuard. The disinformation charges of the chatbots have virtually doubled, going from 18% in August 2024 to 35% a 12 months later, with the instruments offering false claims to information prompts greater than one-third of the time. “As a substitute of citing knowledge cutoffs or refusing to weigh in on delicate matters, the LLMs now pull from a polluted on-line data ecosystem — typically intentionally seeded by huge networks of malign actors, together with Russian disinformation operations — and deal with unreliable sources as credible,” it mentioned.
Israel’s PM Says His U.N. Speech Streamed On to Gaza Cellphones — Israeli Prime Minister Benjamin Netanyahu mentioned his speech on the United Nations final week was additionally pushed to cell phones of Gaza residents in an unprecedented operation. “Girls and gents, because of particular efforts by Israeli intelligence, my phrases are actually additionally being carried,” Netanyahu mentioned. “They’re streamed reside via the cell telephones of Gaza.” There isn’t a proof for a way it will’ve labored or if this really occurred.
Faux Groups Installers Result in Oyster Malware — Risk actors are abusing search engine optimization poisoning and malvertising to lure customers trying to find Groups on-line into downloading a pretend installer that results in malware known as Oyster (aka Broomstick or CleanUpLoader). “Oyster is a modular, multistage backdoor that gives persistent distant entry, establishes Command and Management (C2) communications, collects host data, and allows the supply of follow-on payloads,” Blackpoint mentioned. “By hiding behind a broadly used collaboration platform, Oyster is nicely positioned to evade informal detection and mix into the noise of regular enterprise exercise.” The exercise has been attributed by Conscia to Vanilla Tempest (aka Storm-0832 or Vice Society).
Flaw in Streamlit Framework Patched — Cybersecurity researchers found a vulnerability within the Streamlit app deployment framework that may permit attackers to hijack underlying cloud servers. “To try this, risk actors bypass file sort restrictions and take full management of a misconfigured cloud occasion operating Streamlit purposes,” Cato Networks mentioned. In a hypothetical assault situation, dangerous actors can exploit a file add vulnerability within the framework to rewrite server recordsdata and deploy new SSH configurations. Streamlit launched a safety patch in March.

🎥 Cybersecurity Webinars

Past the Hype: Sensible AI Workflows for Cybersecurity Groups — AI is reworking cybersecurity workflows, however the most effective outcomes come from mixing human oversight with automation. On this webinar, Thomas Kinsella of Tines exhibits find out how to pinpoint the place AI really provides worth, keep away from over-engineering, and construct safe, auditable processes that scale.
Halloween Particular: Actual Breach Tales and the Repair to Finish Password Horrors — Passwords are nonetheless a main goal for attackers—and a continuing ache for IT groups. Weak or reused credentials, frequent helpdesk resets, and outdated insurance policies expose organizations to expensive breaches and reputational harm. On this Halloween-themed webinar from The Hacker Information and Specops Software program, you may see actual breach tales, uncover why conventional password insurance policies fail, and watch a reside demo on blocking compromised credentials in actual time—so you may finish password nightmares with out including consumer friction.
From Code to Cloud: Be taught How you can See Each Threat, Repair Each Weak Hyperlink — Trendy AppSec wants end-to-end visibility from code to cloud. With out it, hidden flaws delay fixes and lift danger. This webinar exhibits how code-to-cloud mapping unites dev, DevOps, and safety to prioritize and remediate sooner, forming the spine of efficient ASPM.

🔧 Cybersecurity Instruments

Pangolin — It’s a self-hosted reverse proxy that securely exposes personal providers to the web with out opening firewall ports. It creates encrypted WireGuard tunnels to attach remoted networks and consists of built-in id and entry administration, so you may management who reaches your inside apps, APIs, or IoT gadgets. Superb for builders, DevOps groups, or organizations needing protected distant entry, Pangolin simplifies sharing inside sources whereas protecting them protected behind robust authentication and role-based permissions.
AI Crimson Teaming Playground — Microsoft’s AI Crimson Teaming Playground Labs affords hands-on challenges to apply probing AI techniques for safety gaps. Constructed on Chat Copilot and powered by the open-source PyRIT framework, it permits you to simulate immediate injections and different adversarial assaults to determine hidden dangers in generative AI earlier than deployment.

Disclaimer: The instruments featured listed here are offered strictly for academic and analysis functions. They haven’t undergone full safety audits, and their conduct might introduce dangers if misused. Earlier than experimenting, rigorously assessment the supply code, check solely in managed environments, and apply acceptable safeguards. At all times guarantee your utilization aligns with moral pointers, authorized necessities, and organizational insurance policies.

🔒 Tip of the Week
Hardening Energetic Listing Towards Trendy Assaults — Energetic Listing is a main goal—compromise it and attackers can personal your community. Strengthen its defenses beginning with Kerberos FAST (Versatile Authentication Safe Tunneling), which encrypts pre-authentication visitors to dam offline password cracking and relay assaults. Deploy it in “Supported” mode, monitor KDC occasions (IDs 34, 35), then implement “Required” as soon as all shoppers are prepared.
Run PingCastle for a speedy forest well being test and use ADeleg/ADeleginator to uncover harmful over-delegation in OUs or service accounts. Harden password safety with Positive-Grained Password Insurance policies (FGPP) and automate native admin password rotation utilizing LAPS or Lithnet Password Safety to dam breached credentials in actual time.
Tighten different management layers: use AppLocker Inspector/Gen to lock down utility execution and GPOZaurr to detect orphaned or dangerous Group Coverage Objects. Scan AD Certificates Companies with Locksmith to shut misconfigurations and use ScriptSentry to catch malicious logon scripts that allow stealthy persistence.
Lastly, apply CIS or Microsoft safety baselines and generate customized Assault Floor Discount guidelines with ASRGen to dam exploit strategies that bypass commonplace insurance policies. This layered, hardly ever applied technique raises the price of compromise and forces even superior adversaries to work far more durable.
Conclusion
These headlines present how tightly linked our defenses should be in in the present day’s risk panorama. No single crew, instrument, or expertise can stand alone—robust safety depends upon shared consciousness and motion.
Take a second to cross these insights alongside, spark a dialog along with your crew, and switch this data into concrete steps. Each patch utilized, coverage up to date, or lesson shared strengthens not simply your personal group, however the wider cybersecurity neighborhood all of us depend on.

The Hacker News Tags:0Day, BMC, Botnet, Bugs, Cisco, DDoS, LockBit, Record, ShadowV2

Post navigation

Previous Post: Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data
Next Post: New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing

Related Posts

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns The Hacker News
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News