
Month: April 2025
-
RansomHub Ransomware Group Compromised 84 Organization, New Groups Emerging
In a significant development within the cybersecurity landscape, the RansomHub ransomware group has emerged as a major threat in March…
-
HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments
Cybersecurity experts have detected a concerning revival of the HelloKitty ransomware, with new variants actively targeting Windows, Linux, and ESXi…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[Lazarus Expands…
-
Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
Threat Actors Use Email Bombing Attacks to Bypass Security Tools & Hide Activity
Email bombing attacks have emerged as a sophisticated technique in cybercriminals’ arsenals, designed to overwhelm targets’ inboxes while concealing more…
-
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248), (Sat, Apr 12th)
[Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248)](/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253248/31850/)===============================================================================================================================================================* * [](http://www.facebook.com/sharer.php?u=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31850 ‘Share on Facebook’)* [](http://twitter.com/share?text=Exploit%20Attempts%20for%20Recent%20Langflow%20AI%20Vulnerability%20%28CVE-2025-3248%29&url=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31850&via=SANS_ISC ‘Share on Twitter’) **Published** : 2025-04-12.…
-
Hackers Actively Exploiting Router Vulnerabilities to Attack Enterprise Networks
A sophisticated campaign targeting enterprise routers has intensified over the past month, with threat actors leveraging previously unknown vulnerabilities to…
-
Threat Actors Actively Attacking Semiconductor Companies With 0-Day Exploits
In a concerning development for the global technology supply chain, sophisticated threat actors have launched a coordinated campaign exploiting previously…
-
China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure
China admitted in a secret meeting with U.S. officials that it conducted Volt Typhoon cyberattacks on U.S. infrastructure, WSJ reports.—————————————————————————————————————————————China…
-
Threat Actors Hijack Legitimate Crypto Packages to Inject Malicious Code
Cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users through compromised npm packages.The attack specifically targets users of…

