
Month: March 2025
-
Akira ransomware gang used an unsecured webcam to bypass EDR
The Akira ransomware gang exploited an unsecured webcam to bypass EDR and launch encryption attacks on a victim’s network.————————————————————————————————————————–Cybersecurity researchers…
-
Unpacking the BADBOX Botnet
The BADBOX botnet, a newly discovered threat, targets Android devices, including high-end models like Yandex 4K QLED TVs. Over 190,000…
-
Cascading Redirects: Unmasking a MultiSite JavaScript Malware Campaign
A recent investigation uncovered a malicious JavaScript injection affecting WordPress websites, redirecting visitors to unwanted third-party domains. The attack vector…
-
Malvertising campaign leads to info stealers hosted on GitHub
A large-scale malvertising campaign impacting nearly one million devices globally was detected in December 2024. The attack originated from illegal…
-
Medusa Ransomware Activity Continues to Increase
Medusa ransomware attacks jumped by 42% between 2023 and 2024. This increase in activity continues to escalate, with almost twice…
-
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
An advanced malware framework known as Winos4.0 was used to target companies in Taiwan in January 2025. Author: AlienVault Related…
-
Havoc: SharePoint with Microsoft Graph API turns into FUD C2
A phishing campaign combines ClickFix and multi-stage malware to deploy a modified Havoc Demon Agent. The attack starts with an…
-
AsyncRAT Reloaded: Using Python and TryCloudflare for Malware Delivery Again
A new AsyncRAT malware campaign has been identified, utilizing malicious payloads delivered through TryCloudflare quick tunnels and Python packages. The…
-
AsyncRAT Reloaded: Using Python and TryCloudflare for Malware Delivery Again
A new AsyncRAT malware campaign has been identified, utilizing malicious payloads delivered through TryCloudflare quick tunnels and Python packages. The…
-
Scalable Vector Graphics files pose a novel phishing threat
Cybercriminals are exploiting the SVG file format to conduct phishing attacks that bypass existing anti-spam and anti-phishing protection. These attacks…

