Latest Cybersecurity News and Articles

Researchers Found New Android Malware Linked to DoNot Team APT Group

The DoNot APT group has been observed misusing the OneSignal platform, which typically provides tools for sending push notifications, in-app messages, emails, and SMS. The group is leveraging OneSignal to deliver phishing links through notifications.

OWASP Unveils Top 10 Smart Contract Vulnerabilities for 2025

This comprehensive awareness document identifies the most critical vulnerabilities in smart contracts, offering developers and security professionals a roadmap to mitigate risks in decentralized ecosystems.

Ukrainian Authorities Warn of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA said, cautioning organizations to be on the lookout for such social engineering attempts that seek to exploit user trust.

CVE-2025-0411: 7-Zip Security Vulnerability Enables Code Execution – Update Now

Trend Micro Zero Day Initiative recently uncovered a vulnerability in 7-Zip. This flaw, tracked as CVE-2025-0411 and assigned a CVSS score of 7.0 (High), could allow attackers to bypass the Mark of the Web (MotW) security feature in Windows.

Gootloader inside out

The operators of Gootloader continually refine their obfuscation techniques. Sophos X-Ops identified heavily obfuscated scripts, with key capabilities like string decryption and counter loops spread across multiple functions.

PoC Exploit for TP-Link Router Vulnerability Reveals Remote Code Execution Risks

This flaw is a buffer overflow vulnerability in the device’s handling of IPv6 DNS server configuration parameters. It could potentially allow attackers to execute arbitrary code or cause denial-of-service attacks.

MintsLoader Malspam Campaign Leads to StealC and BOINC Delivery

The eSentire Threat Response Unit (TRU) uncovered a new malware campaign leveraging a tool called MintsLoader to deliver second-stage payloads, including the StealC malware and the Berkeley Open Infrastructure for Network Computing (BOINC) client.

Critical Sentry Vulnerability Allowed Account Takeovers

By utilizing a malicious SAML Identity Provider and targeting an organization residing on the same Sentry instance, an attacker could have taken over any user account within that organization, provided they knew the victim’s email address.
January 21, 2025

An In-Depth Analysis of IntelBroker

IntelBroker entered the scene in late 2022, first appearing on BreachForums and rapidly building a reputation as a ransomware operator at first and then as an actor responsible for many high-profile data breaches.

IBM Sterling Secure Proxy Faces Multiple Critical Vulnerabilities

IBM has disclosed multiple critical vulnerabilities affecting its Sterling Secure Proxy (SSP), which could allow attackers to inject commands, access sensitive information, or cause denial of service.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags