
Month: August 2025
-
Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack…
-
Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack…
-
Statistics Report on Malware Targeting Windows Web Servers in Q2 2025
AhnLab Security Intelligence Center analyzed attacks on Windows web servers during Q2 2025 using their Smart Defense infrastructure. The study…
-
Statistics Report on Malware Targeting Windows Database Servers in Q2 2025
The analysis team has categorized attacks on MS-SQL and MySQL servers installed on Windows systems during Q2 2025. While the…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first…
-
Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access…
-
Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access…
-
Odyssey Stealer Malware Attacks macOS Users
A phishing campaign targeting macOS users employs a ClickFix technique to deliver the Odyssey Stealer malware. The attack uses a…
-
Odyssey Stealer Malware Attacks macOS Users
A phishing campaign targeting macOS users employs a ClickFix technique to deliver the Odyssey Stealer malware. The attack uses a…

