Updates
Threats
- AI Solutions Are the New Shadow IT
- LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In
- New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login
- Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
- Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits
- Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks
- Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale
- Lumma malware can allegedly restore expired Google auth cookies
- Citrix warns admins to kill NetScaler user sessions to block hackers
Incidents
Cyber Crime
- Maliziöse Insights: Das nordkoreanische Cybercrime-Ökosystem
- US teen pleads guilty to his role in credential stuffing attack on betting site
- Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel
- Russian hackers use Ngrok feature and WinRAR exploit to attack embassies
- DarkGate and Pikabot malware emerge as Qakbot’s successors
- Microsoft: Lazarus hackers breach CyberLink in supply chain attack
Malware
- Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails
- Atomic Stealer malware strikes macOS via fake browser updates
- LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique
- Gamaredon's LittleDrifter USB malware spreads beyond Ukraine
- Lumma Stealer malware now uses trigonometry to evade detection