
Author: Tekno Phreak
-
SharePoint Vulnerabilities (CVE202553770 & CVE202553771): Everything You Need to Know
Two critical zero-day vulnerabilities, CVE-2025-53770 and CVE-2025-53771, are actively exploited in on-premises Microsoft SharePoint servers. These flaws enable unauthenticated remote…
-
From SharePoint Vulnerability Exploit to Enterprise Ransomware
The Warlock ransomware group exploited unpatched Microsoft SharePoint servers to gain initial access and deploy ransomware across enterprise environments. The…
-
Attacks Targeting Linux SSH Servers to Install SVF DDoS Bot
A recent attack on poorly managed Linux servers has been identified, involving the installation of SVF Botnet, a DDoS Bot…
-
CryptoJacking is dead: long live CryptoJacking
The article discusses the evolution of cryptojacking, from its rise with Coinhive in 2017 to its apparent decline and subsequent…
-
SOC files: an APT41 attack on government IT services in Africa
Chinese cyberespionage group APT41 conducted a targeted attack against government IT services in Africa. The attackers used various tools including…
-
SOC files: an APT41 attack on government IT services in Africa
Chinese cyberespionage group APT41 conducted a targeted attack against government IT services in Africa. The attackers used various tools including…
-
Salty 2FA: Undetected PhaaS Hitting US and EU Industries
A new Phishing-as-a-Service (PhaaS) framework dubbed Salty 2FA has been discovered targeting industries in the US and EU. It uses…
-
Ransomware incidents in Japan during the first half of 2025
The first half of 2025 saw a 1.4-fold increase in ransomware attacks in Japan compared to the previous year, with…
-
Election workers fear threats and intimidation without feds’ support in 2026
#### [Security](/security/)Election workers fear threats and intimidation without feds’ support in 2026============================================================================’Hope for the best, but prepare for the worst,’…
-
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in the…

