In today’s rapidly evolving digital landscape, organizations are inundated with alerts from various security tools. A single vulnerability in a cloud asset can trigger notifications […]
Year: 2025
Chinese Cyber Actors Exploit ToolShell Vulnerability in Microsoft SharePoint
In a series of sophisticated cyber intrusions, Chinese-affiliated threat groups have exploited the ToolShell vulnerability in Microsoft SharePoint servers, targeting a diverse array of organizations […]
Cyberattack Targets Ukraine Aid Organizations with Fake Zoom Meetings and Malicious PDFs
On October 8, 2025, a sophisticated spear-phishing campaign, dubbed PhantomCaptcha, targeted organizations involved in Ukraine’s war relief efforts. Cybersecurity firm SentinelOne identified this operation, which […]
Iranian Cyber Espionage Group MuddyWater Targets Over 100 Organizations in MENA Region
The Iranian state-sponsored cyber espionage group known as MuddyWater has initiated a sophisticated campaign targeting more than 100 organizations across the Middle East and North […]
Cavalry Werewolf APT Group Targets Multiple Industries with FoalShell and StallionRAT
Between May and August 2025, a sophisticated cyber threat campaign emerged, targeting Russia’s public sector and critical industries. The group behind these attacks, known as […]
Critical Vulnerability in Chrome’s V8 JavaScript Engine Allows Remote Code Execution
Google has recently addressed a high-severity vulnerability in its Chrome browser’s V8 JavaScript engine, identified as CVE-2025-12036. This flaw could potentially allow attackers to execute […]
Pwn2Own Ireland 2025: 34 Zero-Day Vulnerabilities Uncovered, $522,500 Awarded on Day One
The inaugural day of Pwn2Own Ireland 2025 concluded with remarkable achievements, as security researchers identified 34 unique zero-day vulnerabilities across a spectrum of smart devices. […]
Xubuntu Website Breach: Malicious Windows Executable Distributed via Compromised Downloads
On October 18, 2025, the official Xubuntu website was compromised by threat actors who redirected torrent download links to a malicious ZIP file containing Windows-targeted […]
Hackers Exploit Public ASP.NET Machine Keys to Compromise IIS Servers and Deploy Malicious Modules
In a recent cybersecurity incident, attackers have exploited publicly available ASP.NET machine keys to infiltrate Windows Internet Information Services (IIS) web servers. These machine keys, […]
Critical Vulnerability in Zyxel Firewalls Allows Unauthorized Access to System Configurations
A significant security flaw has been identified in Zyxel’s ATP and USG series firewalls, potentially allowing attackers to bypass authorization mechanisms and access sensitive system […]