New ShadowRay attacks convert Ray clusters into crypto miners

A new global campaign, ShadowRay 2.0, is compromising publicly exposed instances of the distributed computing framework Ray by exploiting a critical, unpatched vulnerability (CVE-2023-48022).

WhatsApp Screen-Sharing Scam Drains $700K in Minutes

A widespread scam campaign is exploiting WhatsApp’s screen-sharing feature alongside malware-based propagation via WhatsApp Web to compromise accounts and execute large-scale financial fraud.

A Vulnerability in FortiWeb Could Allow for Remote Code Execution

A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-25257, has been identified in FortiWeb—a web application firewall (WAF) platform developed to safeguard APIs and web applications from exploitation.

AI-Enhanced Tuoni Framework Targets Major US Real Estate Firm

A sophisticated cyberattack employing the emerging modular post-exploitation framework Tuoni targeted a major US real estate firm. The attack began with a well-executed social engineering campaign leveraging Microsoft Teams impersonation.

IBM AIX Hit by Three Critical Vulnerabilities, One a Perfect 10. Patch Now!

Multiple critical vulnerabilities have been identified in IBM AIX 7.2, 7.3 and IBM VIOS 3.1, 4.1. These flaws, affecting the Network Installation Manager (NIM) services and credential handling mechanisms, pose major security risks.

DoorDash email spoofing vulnerability sparks messy disclosure dispute

A critical email spoofing vulnerability discovered in DoorDash’s Business platform enabled unauthorized actors to send branded phishing emails directly from DoorDash's official servers through the free Business account interface.

Mitsubishi Electric MELSEC iQ-F Series

A medium-severity bug (CVE-2025-10259) has been identified in Mitsubishi Electric's MELSEC iQ-F Series programmable logic controllers (PLCs). The flaw, stemming from improper validation of specified quantity in input, can be exploited remotely.

Decades-old ‘Finger’ protocol abused in ClickFix malware attacks

Threat actors are exploiting the legacy Finger protocol via Windows' built-in finger command to execute remote commands and deploy malware through the ClickFix malware campaign.

Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT

Two evolving malware campaigns—Campaign Trio (Feb–Mar 2025) and Campaign Chorus (May 2025)—are distributing variants of the Gh0st remote access trojan (RAT) by impersonating known software applications through massive fake domain infrastructure.

Crims flood npm with 150K+ junk packages to farm TEA tokens

A large-scale supply chain attack has flooded the npm open-source registry with over 150,000 malicious packages in a campaign exploiting the tea.xyz platform to harvest cryptocurrency rewards.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags