MuddyWater Deploys UDPGangster Backdoor In A Targeted Campaign Across Three Nations
Follow Us For More!
#MuddyWater #InformationSecurity #CyberSecurity #CyberAlerts
#Qilin, a ransomware group with a track record of intrusions against major entities around the world, claimed responsibility for a hack on Japanβs Asahi Group, which disrupted production at the beer and beverage giant. #RansomwareAttacks #AsahiBeer #CyberAlerts www.japantimes.co.jp/business/202...
Passwordstate, used by 29,000 orgs worldwide, just patched a critical flaw.
A crafted URL could bypass its emergency access page β exposing credentials.
Researchers also warn its browser extension was at risk of clickjacking: one bad click could leak logins, cards, even 2FA codes. #CyberAlerts
#ShadowSilk hackers just hit nearly 30+ gov targets across Central Asia & APAC.
The crew? A Russian-Chinese tag team using Telegram bots to hide C2 traffic + stealing Chrome passwords.
Theyβre still activeβnew victims found in July. #CyberSecurity #CyberAlerts thehackernews.com/2025/08/shad...
New 5G attack discovered.
Researchers built #Sni5Gect, a tool that can hijack the 5G handshake, crash phones, or silently downgrade them to 4G β no fake cell tower needed. #CyberSecurity #CyberAlerts #smartphone thehackernews.com/2025/08/new-...
WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosureβhitting critical orgs, leaving hidden web shells, and erasing traces.
Patches are out. If you run NetScaler, act now. #CyberSecurity #CyberAlerts thehackernews.com/2025/08/dutc...
Brazil hit by two cyber threats:
1οΈβ£ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2οΈβ£ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks β swapping crypto wallets + stealing funds. #CyberAlerts #Scam
thehackernews.com/2025/08/ai-t...
RubyGems & PyPI under attack:
πΈ 60 fake RubyGems stole social media logins (275K+ downloads)
πΈ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages. #CyberAlerts thehackernews.com/2025/08/ruby...
11 malicious Go packages just found β infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub. #CyberAlerts #Malware thehackernews.com/2025/08/mali...
CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single pasteβno download, no file, just clipboard commands.
It's smarter than ClearFakeβand spreading fast. #Scam #CyberAlerts thehackernews.com/2025/08/clic...
Russian APT29 hackers hijacked Gmail accounts using app passwordsβbypassing 2FA with social engineering.
They posed as the U.S. State Dept to steal access from academics and critics. #APT29 #CyberAlerts thehackernews.com/2025/06/russ...
Water Curse hijacked 76 GitHub repos to spread stealthy, multi-stage malware.
Posing as dev tools, it steals credentials, hijacks sessions, and persists undetectedβactive since March 2023. #CyberAlerts #Malware thehackernews.com/2025/06/wate...
The state-backed North Korean threat group Konni (Opal Sleet, TA406) was observed targeting Ukrainian government entities in intelligence collection operations. #CyberAttacks #CyberAlerts www.bleepingcomputer.com/news/securit...
Forescout Vedere Labs security researchers have linked ongoing attacks targeting a maximum severity vulnerability impacting SAP NetWeaver instances to a Chinese threat actor. #CyberSecurity #CyberAlerts www.bleepingcomputer.com/news/securit...
FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks. #CyberAlerts www.bleepingcomputer.com/news/securit...
Zero-click, max impact β and it's already being exploited.
A critical Commvault bug (CVE-2025-34028, CVSS 10.0) lets hackers upload poisoned ZIPs, leading to full remote code executionβno login needed.
#CyberAlerts
thehackernews.com/2025/05/comm...
Deadline for U.S. agencies: May 23.
Nation-state hackers breached Commvaultβs Azure-hosted environment by exploiting a zero-day in Commvaultβs own web server β CVE-2025-3928.
π Check sign-ins
π« Block malicious IPs
π Report activity fast
#CyberSecurity #CyberAlerts
thehackernews.com/2025/05/comm...
Hackers are disguising malware as security plugins to hijack sites, inject spammy ads, steal credit cards, & even re-install themselves if deleted.
Some victims are unknowingly losing their own AdSense earnings.
#CyberAlerts
thehackernews.com/2025/05/fake...
Your AI Copilot could leak your secrets β without you even knowing.
Microsoft 365 Copilot boosts productivity, but opens the door to massive data risks. Reco spots risky prompts, flags hidden attacks, and locks down your SaaS ecosystem. #CyberAlerts thehackernews.com/2025/04/prod...
New Linux Rootkit Exploits io_uring, Evades Detection
ARMOβs Curing rootkit uses io_uring to bypass system call monitoringβFalco, Tetragon, and even Microsoft Defender canβt see it.
#CyberAlerts #Linux #CyberSecurity π§
Attackers can run commands without triggering system calls.
159 Bugs Exploited in 90 Days!
1 in 4 breaches now starts with a CVE exploit. In Q1 2025, 159 flaws hit in the wildβ28% within 24 hours of disclosure.
#CyberSecurity #CyberAlerts
Top targets: CMSes, edge devices, Windows.
thehackernews.com/2025/04/159-...
#LazarusGroup strikes South Koreaβagain.
6 major industries breached via watering hole attacks + zero-days in Cross EX & Innorix Agent.
Malware used: ThreatNeedle & more.
#CyberAlerts #Malware #SupplychainsAttacks
π Supply chains are the target.
thehackernews.com/2025/04/laza...
Critical Exploit Alert!
A 9.0 CVSS flaw in Commvault Command Center lets hackers run code without logging in.
π― Targets versions 11.38.0β11.38.19
π₯ Pre-auth SSRF β Remote Code Execution
#CyberAlerts #CyberSecurity
Learn more about CVE-2025-34028 here:
thehackernews.com/2025/04/crit...
New Tactics from Russian Hackers!
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesβjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
#CyberAlerts
ClickFix attacks are gaining traction among threat actors, with multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia adopting the technique in recent espionage campaigns. #APThacker #CyberAlerts www.bleepingcomputer.com/news/securit...
Attackers exploit 2024β25 zero-days, deploy SuperBlack & WeaXor ransomware, and run phishing via hacked WordPress sites.
#CyberAlerts #CyberAttacks
thehackernews.com/2025/04/hack...
From zero-click iOS exploits to NTLM credential leaks and the 4Chan breach β this weekβs cyber threats hit where trust runs deepest.
THNβs Weekly Recap breaks down the stealth, the strategy, and the systems under fire. #CyberSecurity #CyberAlerts
thehackernews.com/2025/04/thn-...
Pakistan-linked hackers are ramping up attacks on India's oil, railways, and external affairs sectors using Xeno RAT, Spark RAT, and new malware CurlBack RAT.
They're now using MSI packagesβditching old methodsβto steal browser data, files, and credentials across Windows & Linux. #CyberAlerts
Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer to mine Ethereum and Monero. #MaliciousVSCode #CyberAlerts www.bleepingcomputer.com/news/securit...
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research. #bugbounty #CyberAlerts