VSCode Malware and Fake Developer Tools
March 24, 2025
Harmful VSCode Extensions Spread Early-Stage Ransomware Researchers recently discovered two dangerous extensions in the VSCode Marketplace. Named "ahban.shiba" and "ahban.cychelloworld," these add-ons were designed to launch a piece of ransomware that is still in its testing phase. The marketplace…
0 Comments2 Minutes
Medusa Ransomware on the Rise in 2025 according to the CIA and FBI
March 21, 2025
Overview The FBI and CISA have recently warned about a growing threat from the Medusa ransomware group. Recent intelligence shows that attacks by this group are happening almost every day this year, with a nearly 45% increase compared to 2024. This surge has prompted government agencies to issue an…
0 Comments3 Minutes
AI Is Not a Toy: A Cybersecurity Guide on AI Dangers and Safe Usage
March 20, 2025
AI Dangers and Safe Usage Artificial intelligence offers incredible tools—from content creation and photo animation to automating everyday tasks. However, using these tools without proper safeguards can expose you and your organization to serious cybersecurity risks. This guide explores the…
0 Comments15 Minutes
GitHub Actions in Your Workflows Could Leak Data and information
March 19, 2025
A new security issue has been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) list of known risks. The problem comes from a flaw in the tj-actions/changed-files GitHub Action that lets hackers sneak in bad code. The vulnerability is marked as CVE-2025-30066 with a high…
0 Comments3 Minutes
A New Wave in Ad Fraud and Botnet Attacks
March 18, 2025
Overview A new version of a major ad fraud and residential proxy scheme, known as BADBOX 2.0, has emerged, involving at least four different cybercrime groups. This operation has been described as the largest botnet ever found among connected TV devices and similar gadgets. The scheme infects…
0 Comments5 Minutes
CSS exploits in emails are tracking your actions and data.
March 17, 2025
Introduction Cybercriminals have found a new way to sneak past email filters and secretly monitor user actions by misusing basic CSS exploits. CSS, a tool normally used to add style and structure to web pages, is now being manipulated in emails to hide extra content and gather details about the…
0 Comments4 Minutes
New Phishing Scam Poses as Booking.com to Steal info
March 13, 2025
Microsoft has uncovered an ongoing Phishing Attack that targets the hospitality industry by posing as the online travel platform Booking.com. The attack, tracked under the name Storm-1865, began in December 2024 and aims to commit financial fraud and data theft. You might be interested in:…
0 Comments6 Minutes
How SSRF Exploits Can Steal Your Cloud Credentials and Sensitive Data
March 12, 2025
Coordinated SSRF Exploits on Multiple Platforms A cybersecurity warning has been issued by threat intelligence company GreyNoise about a recent spike in SSRF Exploits targeting Server-Side Request Forgery (SSRF) vulnerabilities. On March 9, 2025, the company detected over 400 IP addresses actively…
0 Comments3 Minutes
Your Router Might Be Infected by Ballista Botnet
March 11, 2025
Overview A new botnet, known as Ballista, is now attacking TP-Link Archer routers that haven’t been updated. According to researchers at Cato CTRL, the botnet takes advantage of a serious flaw (CVE-2023-1389) in these devices. This weakness lets hackers send commands to the router remotely, putting…
0 Comments3 Minutes
Fake Browser Extensions That Steal Login Info
March 10, 2025
Fake Browser Extensions Cybersecurity experts have revealed a new way hackers can use Fake Browser Extensions to impersonate legitimate ones, tricking users into giving away their login details. You might be interested in: This PolarEdge Trojan Turns Devices Into Remote Attack Tools According to a…
0 Comments2 Minutes