
Month: August 2025
-
Major August 2025 Cyber Attacks: 7Stage Tycoon2FA Phishing, New ClickFix Campaign, and Salty2FA
In August 2025, significant cyber attacks emerged, including a 7-stage Tycoon2FA phishing campaign targeting government, military, and financial institutions across…
-
Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to…
-
Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to…
-
ZipLine Phishing Campaign Targets U.S. Manufacturing
A sophisticated phishing campaign called ZipLine is targeting U.S. manufacturing companies, especially those in supply chain-critical sectors. The attackers initiate…
-
ZipLine Phishing Campaign Targets U.S. Manufacturing
A sophisticated phishing campaign called ZipLine is targeting U.S. manufacturing companies, especially those in supply chain-critical sectors. The attackers initiate…
-
Virtual Infrastructure Abuse leads to SaaS Hijacks
This analysis examines a series of coordinated SaaS account compromises across multiple customer environments, involving suspicious logins from VPS-linked infrastructure…
-
WinRAR Directory Traversal & NTFS ADS Vulnerabilities (CVE20256218 & CVE20258088)
Two high-severity vulnerabilities in WinRAR for Windows enable attackers to write files outside intended extraction directories. CVE-2025-6218 involves traditional path…
-
Top 15 Best Security Incident Response Tools In 2025
**Incident response Tools or incident management software** are essential security solutions to protect businesses and enterprises from cyber attacks.Our reliance…
-
The end of an era: Properly formated IP addresses in all of our data., (Sun, Aug 24th)
[The end of an era: Properly formated IP addresses in all of our data.](/forums/diary/The+end+of+an+era+Properly+formated+IP+addresses+in+all+of+our+data/32228/)=================================================================================================================================================================* * [](http://www.facebook.com/sharer.php?u=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F32228 ‘Share on Facebook’)* [](http://twitter.com/share?text=The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data.&url=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F32228&via=SANS_ISC…
-
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool…

