Cybercriminals have initiated a complex campaign that employs brand impersonation techniques to disseminate malware through deceptive SMS phishing, commonly known as smishing. This development signifies […]
Day: October 3, 2025
Threat Actors Exploit WhatsApp to Distribute SORVEPOTEL Malware Targeting Windows Systems
In early September 2025, cybersecurity researchers identified a sophisticated malware campaign targeting Windows systems through WhatsApp messages. The malware, dubbed SORVEPOTEL, employs social engineering tactics […]
SideWinder Hacker Group Deploys Fake Outlook and Zimbra Portals to Harvest Credentials
The SideWinder Advanced Persistent Threat (APT) group, a state-sponsored entity with a history of cyber espionage in South Asia, has initiated a sophisticated phishing campaign. […]
Understanding Fileless Malware: A Stealthy Cyber Threat
In the ever-evolving landscape of cybersecurity, fileless malware has emerged as a formidable adversary, challenging traditional defense mechanisms and necessitating a deeper understanding of its […]
Chinese Cybercriminals Exploit IIS Servers to Manipulate Search Rankings
A Chinese-speaking cybercrime group, identified as UAT-8099, has been infiltrating high-value Microsoft Internet Information Services (IIS) servers across multiple countries, including India, Thailand, Vietnam, Canada, […]
Critical Vulnerability in DrayOS Routers Allows Remote Code Execution
A significant security flaw has been identified in DrayTek’s DrayOS routers, potentially enabling unauthenticated remote attackers to execute arbitrary code. This vulnerability, designated as CVE-2025-10547, […]
Critical Vulnerabilities in TOTOLINK X6000R Routers Expose Users to Remote Code Execution
Recent security analyses have uncovered significant vulnerabilities in the TOTOLINK X6000R wireless router, posing severe risks to users by allowing remote attackers to execute arbitrary […]
Grafana Vulnerability Exploited in Coordinated Attack Targeting Arbitrary File Reads
On September 28, 2025, security researchers at GreyNoise identified a significant surge in attempts to exploit a known vulnerability in Grafana, the widely used open-source […]
Emergence of XWorm V6: Advanced Malware Injects Malicious Code into Legitimate Windows Processes
In mid-2025, the cybersecurity landscape witnessed the resurgence of XWorm, a sophisticated malware that had previously faded from prominence. This revival was marked by the […]
GhostSocks Malware-as-a-Service: Transforming Compromised Devices into Proxies
In the ever-evolving landscape of cyber threats, a new player has emerged that significantly enhances the capabilities of cybercriminals: GhostSocks. This Malware-as-a-Service (MaaS) offering enables […]