
Author: Tekno Phreak
-
Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
Darknet markets, operating beyond the reach of traditional payment processors and legal systems, rely on escrow systems to secure cryptocurrency…
-
The Solidity Language opensource package was used in a $500,000 crypto heist
A malicious extension for the Solidity programming language in the Cursor AI IDE led to a $500,000 cryptocurrency theft. The…
-
Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack…
-
Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack…
-
Statistics Report on Malware Targeting Windows Web Servers in Q2 2025
AhnLab Security Intelligence Center analyzed attacks on Windows web servers during Q2 2025 using their Smart Defense infrastructure. The study…
-
Statistics Report on Malware Targeting Windows Database Servers in Q2 2025
The analysis team has categorized attacks on MS-SQL and MySQL servers installed on Windows systems during Q2 2025. While the…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first…
-
New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer
Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first…
-
Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access…
-
Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Akira affiliates have been observed exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access…

