
Author: Tekno Phreak
-
June 2025 Infostealer Trend Report
This analysis provides insights into Infostealer malware trends observed in June 2025. The data, collected through various automated systems, reveals…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
Rainbow Hyena strikes again: new backdoor and shift in tactics
A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The…
-
Windows 10 KB5062554 update breaks emoji panel search feature
The search feature for the Windows 10 emoji panel is broken after installing the KB5062554 cumulative update released…
-
Google Gemini flaw hijacks email summaries for phishing
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious instructions or warnings…
-
You have a fake North Korean IT worker problem – here’s how to stop it
#### [Cyber-crime](/security/cyber_crime/)**22** You have a fake North Korean IT worker problem – here’s how to stop it======================================================================**22** Thick resumes with…
-
Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb
PoC exploits released for critical Fortinet FortiWeb flaw allowing pre-auth RCE. Fortinet urges users to patch.—————————————————————————————————————Proof-of-concept (PoC) exploits for CVE-2025-25257…
-
Wing FTP Server flaw actively exploited shortly after technical details were made public
Hackers exploit critical Wing FTP flaw (CVE-2025-47812) for remote code execution with root/system rights after details leaked on June 30.——————————————————————————————————————————————Threat…
-
Weekly Cybersecurity Roundup: Key Vulnerabilities, Threats, and Data Breaches
In today’s rapidly evolving digital landscape, the frequency and complexity of cyberattacks are increasing, making it crucial to stay informed…

