Known Exploited Vulnerabilities Catalog

The vulnerability in TeamT5 ThreatSonar Anti-Ransomware allows remote attackers with administrator privileges to upload malicious files, potentially leading to arbitrary command execution on the server.

Keenadu the tablet conqueror and the links between major Android botnets

Keenadu is a sophisticated backdoor targeting Android devices by embedding itself into the firmware. It mirrors the behavior of the Triada backdoor, allowing attackers to control devices remotely and exfiltrate data.

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

The SmartLoader campaign involves a sophisticated attack using a trojanized Oura MCP server to deploy the StealC infostealer. Threat actors have invested months in building credibility by creating fake GitHub accounts and repositories.

Vulnerabilities in Password Managers Allow Hackers to Change Passwords

A recent study by academic researchers uncovered 27 vulnerabilities in popular cloud-based password managers: Bitwarden, LastPass, Dashlane, and 1Password. These vulnerabilities allow attackers to view and change passwords.

Infostealer malware found stealing OpenClaw secrets for first time

OpenClaw, formerly known as ClawdBot and MoltBot, is a widely adopted AI assistant framework that has become a target for infostealer malware. This malware is capable of stealing sensitive configuration files.

BeyondTrust RCE Exploited for Domain Control

CVE-2026-1731, a critical unauthenticated OS command injection vulnerability, is being actively exploited in self-hosted BeyondTrust Remote Support and Privileged Remote Access deployments.

Pastebin comments push ClickFix JavaScript attack to hijack crypto swaps

A novel ClickFix-style attack has been identified, utilizing JavaScript to hijack cryptocurrency swaps on Swapzone.io. This is one of the first known instances where JavaScript is used to alter webpage functionality for malicious purposes.

Malicious npm and PyPI packages Llinked to Lazarus APT fake recruiter campaign

The Lazarus Group, a North Korean APT, has launched a sophisticated campaign using malicious npm and PyPI packages. This operation, known as 'graphalgo', targets developers through fake recruitment schemes.

Fake AI Chrome extensions with 300K users steal credentials, emails

A malicious campaign involving 30 Chrome extensions, known as AiFrame, has been identified, affecting over 300,000 users. These extensions masquerade as AI assistants to steal credentials, email content, and browsing information.

World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks

World Leaks, a notorious cyber-criminal group, has enhanced its attack arsenal with a new malware named 'RustyRocket'. This sophisticated toolset is a critical component of World Leaks' operations.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags