
Category: Threat Intel Reports
-
Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
Cybercriminals have increasingly turned to legitimate software installation frameworks as vehicles for malware distribution, with Inno Setup emerging as a…
-
Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environme
Cybersecurity researchers have discovered a sophisticated attack technique that exploits Microsoft Azure Arc deployments to gain persistent access to enterprise…
-
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload
A new wave of cyberattacks is targeting organizations that inadvertently expose Java Debug Wire Protocol (JDWP) servers to the internet,…
-
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition
“`Key Takeaways1. Next.js versions 15.1.0-15.1.8 have a cache poisoning bug causing DoS attacks through blank page delivery.2. Needs affected Next.js…
-
Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
As previously reported, Nova Scotia Power confirmed that it had been the victim of a ransomware attack in March but…
-
Critical Sudo bugs expose major Linux distros to local Root exploits
Critical Sudo flaws let local users gain root access on Linux systems, the vulnerabilities affect major Linux distributions.—————————————————————————————————————————-Cybersecurity researchers disclosed…
-
Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
Throughout 2024, Gamaredon focused exclusively on targeting Ukrainian governmental institutions with spearphishing campaigns and weaponized USB drives. The group developed…
-
Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
Throughout 2024, Gamaredon focused exclusively on targeting Ukrainian governmental institutions with spearphishing campaigns and weaponized USB drives. The group developed…
-
macOS NimDoor | North Korean Threat Actors Target Web3 and Crypto Platforms with NimBased Malware
DPRK threat actors are targeting Web3 and crypto-related businesses using Nim-compiled binaries and multiple attack chains. The malware, dubbed NimDoor,…
-
Apache Under the Lens: Tomcats Partial PUT and Camels Header Hijack
In March 2025, Apache disclosed three critical vulnerabilities: CVE-2025-24813 in Apache Tomcat and CVE-2025-27636 and CVE-2025-29891 in Apache Camel. These…

