
Month: August 2025
-
Attacks Targeting Linux SSH Servers to Install SVF DDoS Bot
A recent attack on poorly managed Linux servers has been identified, involving the installation of SVF Botnet, a DDoS Bot…
-
CryptoJacking is dead: long live CryptoJacking
The article discusses the evolution of cryptojacking, from its rise with Coinhive in 2017 to its apparent decline and subsequent…
-
SOC files: an APT41 attack on government IT services in Africa
Chinese cyberespionage group APT41 conducted a targeted attack against government IT services in Africa. The attackers used various tools including…
-
SOC files: an APT41 attack on government IT services in Africa
Chinese cyberespionage group APT41 conducted a targeted attack against government IT services in Africa. The attackers used various tools including…
-
Salty 2FA: Undetected PhaaS Hitting US and EU Industries
A new Phishing-as-a-Service (PhaaS) framework dubbed Salty 2FA has been discovered targeting industries in the US and EU. It uses…
-
Ransomware incidents in Japan during the first half of 2025
The first half of 2025 saw a 1.4-fold increase in ransomware attacks in Japan compared to the previous year, with…
-
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in the…
-
Election workers fear threats and intimidation without feds’ support in 2026
#### [Security](/security/)Election workers fear threats and intimidation without feds’ support in 2026============================================================================’Hope for the best, but prepare for the worst,’…
-
Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems
Man-in-the-Prompt: a new threat targeting AI tools like ChatGPT and Gemini via simple browser extensions, no complex attack needed.———————————————————————————————————————————–A new…
-
Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
A critical vulnerability in the Microsoft Web Deploy tool could allow authenticated attackers to execute remote code on affected systems.The…

