
Month: July 2025
-
Infrastructure of Interest: Suspicious Domains
Domains identified by an automated threat monitoring infrastructure, which leverages advanced AI-driven analysis to detect anomalous and high-risk activity. Author:…
-
June 2025 Threat Trend Report on Ransomware
The June 2025 threat analysis reveals an increase in new ransomware samples compared to May. The data is based on…
-
June 2025 Infostealer Trend Report
This analysis provides insights into Infostealer malware trends observed in June 2025. The data, collected through various automated systems, reveals…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
You have a fake North Korean IT worker problem – here’s how to stop it
#### [Cyber-crime](/security/cyber_crime/)**22** You have a fake North Korean IT worker problem – here’s how to stop it======================================================================**22** Thick resumes with…
-
Google Gemini flaw hijacks email summaries for phishing
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings…
-
Windows 10 KB5062554 update breaks emoji panel search feature
The search feature for the Windows 10 emoji panel is broken after installing the KB5062554 cumulative update released…
-
Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb
PoC exploits released for critical Fortinet FortiWeb flaw allowing pre-auth RCE. Fortinet urges users to patch.—————————————————————————————————————Proof-of-concept (PoC) exploits for CVE-2025-25257…

