Wednesday, February 19, 2025

Cyber Security News

sectopRAT

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

0
SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework.This malware is notorious for its advanced...
Popular Games

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

0
A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games.Exploiting the holiday season's heightened torrent activity, the...
MITRE ATT&CK

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

0
A recent study by researchers from the National University of Singapore and NCS Cyber Special Ops R&D explores how the MITRE ATT&CK framework can...
LLM Vulnerability

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

0
A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT, raising concerns over their susceptibility to adversarial attacks.Researchers have...
Lumma InfoStealer

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

0
A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as PDF documents.This campaign...
Credit Card Stealer

Cybercriminals Embedded Credit Card Stealer Script Within <img> Tag

0
Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform.This attack exploits <img> HTML tags to...
DarkMind

DarkMind: A Novel Backdoor Attack Exploiting Customized LLMs’ Reasoning Capabilities

0
The rise of customized large language models (LLMs) has revolutionized artificial intelligence applications, enabling businesses and individuals to leverage advanced reasoning capabilities for complex...
SIEM as a Service

Recent News

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit

0
Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing kit through fraudulent timesheet notification emails, marking a concerning evolution...
Ivanti Connect Secure

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

0
In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability in Ivanti Connect Secure (ICS) appliances, tracked as CVE-2025-0282.This...
Earth Preta APT

Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows

0
Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group Earth Preta, also known...
FortiOS & FortiProxy

FortiOS & FortiProxy Vulnerability Allows Attackers Firewall Hijacks to Gain Super Admin Access

0
A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to bypass authentication and gain super-admin access.The flaw, classified...
APT43 Hackers

APT43 Hackers Targeting Academic Institutions Using Exposed Credentials

0
APT43, also known by aliases such as Black Banshee, Emerald Sleet, and Kimsuky, is a North Korean state-sponsored cyber threat actor linked to the...

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

0
A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left over 30,000 WordPress websites exposed to exploitation.The vulnerability, identified...
WordPress Sites

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

0
Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE).These attacks exploit vulnerabilities in WordPress...

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability

0
Threat actors actively exploit a new high-severity vulnerability, CVE-2025-0108, in Palo Alto Networks' PAN-OS.This exploit allows attackers to bypass authentication, execute certain PHP scripts,...
IT Workers

North Korean IT Workers Penetrate Global Firms to Install System Backdoors

0
In a concerning escalation of cyber threats, North Korean IT operatives have infiltrated global companies, posing as remote workers to introduce system backdoors and...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary