How SSRF Exploits Can Steal Your Cloud Credentials and Sensitive Data
March 12, 2025
Coordinated SSRF Exploits on Multiple Platforms A cybersecurity warning has been issued by threat intelligence company GreyNoise about a recent spike in SSRF Exploits targeting Server-Side Request Forgery (SSRF) vulnerabilities. On March 9, 2025, the company detected over 400 IP addresses actively…
0 Comments3 Minutes
Your Router Might Be Infected by Ballista Botnet
March 11, 2025
Overview A new botnet, known as Ballista, is now attacking TP-Link Archer routers that haven’t been updated. According to researchers at Cato CTRL, the botnet takes advantage of a serious flaw (CVE-2023-1389) in these devices. This weakness lets hackers send commands to the router remotely, putting…
0 Comments3 Minutes
Fake Browser Extensions That Steal Login Info
March 10, 2025
Fake Browser Extensions Cybersecurity experts have revealed a new way hackers can use Fake Browser Extensions to impersonate legitimate ones, tricking users into giving away their login details. You might be interested in: This PolarEdge Trojan Turns Devices Into Remote Attack Tools According to a…
0 Comments2 Minutes
Urgent Security Update for Kibana
March 6, 2025
What Happened Elastic has released an important security update for Kibana, the dashboard tool used with Elasticsearch. A dangerous bug was found that could let attackers run harmful code. This bug, identified as CVE-2025-25012, is linked to a problem called prototype pollution. With a very high…
0 Comments3 Minutes
Malicious Go Modules: Trojan Threats Targeting Linux and macOS Computers
March 5, 2025
Overview Security experts have uncovered a significant cyber threat aimed at the Go programming community. Recent investigations reveal that several fake Go modules, posing as popular Go libraries, are being used to infect Linux and macOS systems with loader malware. This ongoing campaign targets…
0 Comments5 Minutes
Brute-Force Assault on 4K ISPs | Double-Check Your Passwords
March 4, 2025
A group of unknown cybercriminals has been targeting internet service providers in China and on the West Coast of the United States. Their goal is to infect systems with malware that steals data and mines cryptocurrency. These operations have been uncovered by researchers at the Splunk Threat…
0 Comments3 Minutes
This PolarEdge Trojan Turns Devices Into Remote Attack Tools
February 27, 2025
Overview of the Attack A new botnet, named "PolarEdge," has been identified as targeting devices from brands like Cisco, ASUS, QNAP, and Synology since late 2023. French cybersecurity company Sekoia recently uncovered the threat, which is exploiting a critical vulnerability (CVE-2023-20118)…
0 Comments5 Minutes
This Black Basta Ransomware Locks Your Files and Steals Millions
February 26, 2025
A massive leak of internal chat logs from the notorious ransomware group Black Basta has exposed their operations, internal conflicts, and tactics. The logs, spanning over a year, were published online, offering a rare glimpse into the workings of one of the most dangerous cybercriminal groups. You…
0 Comments4 Minutes
This LightSpy Malware Steals Your Social Media Info
February 25, 2025
What is LightSpy? LightSpy is a dangerous spyware program that can infect Windows, macOS, and Apple devices. First discovered in 2020 targeting users in Hong Kong, it has since evolved into a more powerful tool for cybercriminals. You might be interested in: RansomHub Leads Ransomware Attacks in…
0 Comments4 Minutes
Massive $1.5B Crypto Theft Shocks Market
February 24, 2025
Massive $1.5B Crypto Theft Shakes Cryptocurrency Exchange In what experts believe is the biggest digital heist ever, $1.5B Crypto Theft (£1.2 billion) from the cryptocurrency exchange Bybit. The Dubai-based platform has now called on top cybersecurity experts to help recover the stolen funds. You…
0 Comments4 Minutes