Author: Admin

It was found in Microsoft Windows found Silence and Darkwisp. Activities was linked to a Russian hacking group called Water Hamayunwhich is also known as Encrypthub and larva-208. “The Threat Actor Deploy Payloads Primarily by Melicious Provisioning Packages, Signed .msi Files, and Windows Msc Files, Using Techniques Like The Intellij Runnerw.exe for Command Execution,” Trend Micro Researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahim – Note In the following analysis published last week. Water Gamayun has been associated with the active operation of the CVE-2025-2633 (aka MSc Eviltwin), vulnerability within Microsoft Cancole (MMC) to perform malicious software using the Microsoft Console…

Read More

March 31, 2025Hacker NewsDetection of invasion / vulnerability If you are using AWS, it is easy to assume that your cloud security is handled – but it’s a dangerous misconception. AWS provides its own infrastructure but security inside The cloud is the client’s responsibility. Think about AWS safety, such as building protection: AWS provides strong walls and firm roofs, but clients depend on the processing of the locks, install the alarm and make sure the values ​​do not remain subjected. In this blog we will clarify what AWS does not provide vulnerability in the real world, and like cloud safety…

Read More

March 31, 2025Red LakshmananData steal / web safety The threatening actors use the MU-planning catalog on WordPress websites to hide the malicious code to maintain permanent remote access and redirect site visitors to fake sites. Mu-meline shortened for Required plugsrefers to plugins in a special directory (“WP-Content/Mu-Plugins”), which are automatically performed by WordPress without having to turn them clearly through the administrator’s dashboard. It also makes the catalog the perfect place for malware. “This approach is a tendency because the MU-Plane (the plugin of the compulsory use) is not made in the standard WordPress plugin interface, making them less noticeable…

Read More

March 31, 2025Red LakshmananIntelligence threats / malicious software Subjects in Ukraine were aimed at a phishing campaign aimed at distributing Trojan remote Rat Remecos. “File names use Russian words related to troops in Ukraine as a bait,” Cisco Talos Guilherme Venere researcher – Note In a report published last week. “Loading PowerShell is in contact with geo-aggregated servers located in Russia and Germany to download the mail file in the second stage containing Backdoor Remcos.” Activities has been associated with moderate confidence for a Russian hacking group known as HomoredonAlso tracked under Monikers Aqua Blizzard, Armageddon, Blue Otso, Bluealpha, Hive0051,…

Read More

March 30, 2025Red LakshmananVulnerability / zero day US Cybersecurity and infrastructure agencies (CISA) shed light on a new malicious software called Rebellion This was deployed within the framework of operating activities aimed at the current lack of security in IVanti Connect Secure (ICS) devices. “Management contains the possibilities of malicious Spownchimera software, including reset that survived; however, resurge contains distinctive commands that change its behavior,” agency – Note. “The file contains the possibilities of rootkit, dropper, back, bootkit, proxy and tunneler.” The vulnerability of security associated with the deployment of malware, there is Cve-2025-0282The vulnerability of a stack -based buffer…

Read More

March 29, 2025Red LakshmananIntelligence threats / mobile security Cybersecurity researchers have discovered a new malicious Android Banking software called Crocodile This is primarily intended for targeting users in Spain and Turkey. “Crocodilus goes on stage not as a simple clone, but as a full threat from the beginning, equipped with modern – Note. As of other Bank trojans Of -a sort of malicious software designed to facilitate devices’ absorption (Hundred) and eventually conduct fake operations. Analysis of the source code and reports of debugs shows that the author of malware is Turkish. Crocodilus Artifacts, analyzed by the Dutch Masquerade Mobile…

Read More

March 29, 2025Red LakshmananCybercrime / vulnerability In what is hacking hackers, hunting for threats managed to penetrate into the Internet infrastructure associated with a ransom group called Blacklock, revealing important information about their mode of operation. Transfiguration stated that it determined the safety vulnerability on the data site (DLS), which is managed by an electronic crime group that made it possible to extract configuration files, credentials, as well as teams made on the server. The downside concerns “a certain erroneous configuration on the data leak (DLS) BlackLock Ransomware, which leads to the IP -Drass Clearnet, related to their network infrastructure,…

Read More

March 28, 2025Red LakshmananOperational technology / vulnerability Cybersecurity researchers have discovered 46 new safety deficiencies in three solar -sellers, Sungrow, Growatt and SMAs, which can be used by a bad actor to confiscate devices or remote code, creating serious risks for electrical networks. The vulnerabilities were collectively named Sun: Down by forescout vedere labs. “New vulnerabilities can be used to execute arbitrary commands on devices or cloud provider, consider, gain a foothold in the supplier’s infrastructure or take control of the inverter owners’ device”, company company, company – Note In a report that shared with Hacker News. Some of the…

Read More

March 28, 2025Red LakshmananIntelligence of security / threat final point Cybersecurity researchers pay attention to a new complex malicious software called Coffeeode This is designed to download and perform secondary useful loads. According to ZSCALER OPHERLABZ, shares the similarity of behavior with another known forklifts malicious programs known as Diplomat. “The purpose of the malicious software-loading and perform useful load in the second stage, evading the detection of safety products based – Note In a technical record published this week. “Malicious software uses numerous methods to bypass safety solutions, including a specialized package that uses GPU, reinforcement of the stack…

Read More

March 28, 2025Red LakshmananSpying software / malicious software Earlier, the Android Malter Malware Service Service Service was associated with a new company that is probably aimed at Taiwan’s users under the guise of chat applications. “PJOBrat can steal SMS messages, telephone contacts, devices and apps, documents and media files from infected Android devices,” Sophos Security Pankaj Kohli Researcher Kohli – Note In the Thursday analysis. Pjobrat, First documented In 2021, there were results of use against Indian military purposes. The following malware iterations were discovered as appraisal applications and instant messages to deceive future victims. It is known that it…

Read More