Developers Beware - Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens

A new wave of sophisticated phishing attacks is targeting software developers by exploiting GitHub’s OAuth 2.0 Device Code Flow. These attacks enable threat actors to hijack developer tokens and more.

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities

Nytheon AI, a new uncensored large language model (LLM) platform, is rapidly gaining popularity on hacking forums due to its ability to generate malicious content without safety restrictions.

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international partners from the Five Eyes alliance, has released a comprehensive set of guidelines aimed at enhancing the security of network edge devices.

Attackers Unleash TeamFiltration: Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool

A new account takeover campaign, tracked as UNK_SneakyStrike, is actively exploiting the legitimate penetration testing tool TeamFiltration to compromise Microsoft Entra ID accounts.

Malware found in NPM packages with 1 million weekly downloads

A major supply chain attack has compromised 16 popular Gluestack 'react-native-aria' packages on NPM, affecting nearly 960,000 weekly downloads. The attack involves the injection of obfuscated remote access trojan (RAT) code.

Critical Fortinet flaws now exploited in Qilin ransomware attacks

Qilin RaaS is now exploiting two critical Fortinet vulnerabilities—CVE-2024-21762 and CVE-2024-55591—to bypass authentication and deploy ransomware. These impacted high-profile organizations and are currently targeting Spanish-speaking countries

Be Careful With Fake Zoom Client Downloads

A new phishing campaign is targeting remote workers by impersonating Zoom update notifications. The campaign exploits users' urgency to stay updated with the latest software versions, a common requirement for remote collaboration tools.

Thousands of Internet-Exposed Solar Power Devices Pose Critical Infrastructure Risk

These devices, manufactured by 42 different vendors, include essential components for solar energy operations and are often exposed due to poor asset visibility and management.

What 17,845 GitHub Repos Taught Us About Malicious MCP Servers

A recent audit of nearly 18,000 Model Context Protocol (MCP) servers on GitHub revealed that 1,408 repositories may have been intentionally designed for malicious purposes.

35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks

Forescout Research Vedere Labs has identified nearly 35,000 internet-exposed solar power systems—including inverters, data loggers, and gateways—from 42 vendors using the Shodan search engine.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags