Aggregator
Town of Kittery, Maine falls victim to INC RANSOM Ransomware
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools
A sophisticated cyber attack campaign has emerged targeting Ukraine’s critical infrastructure, utilizing a previously unknown destructive malware variant that researchers have designated “PathWiper.” This latest threat represents a significant escalation in the ongoing cyber warfare landscape, demonstrating advanced capabilities designed to cause maximum disruption to essential services and systems across the embattled nation. The malware […]
The post New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools appeared first on Cyber Security News.
CVE-2025-29884 | QNAP File Station 5.5.6.4741 certificate validation (qsa-25-09 / EUVD-2025-17345)
CVE-2025-29883 | QNAP File Station 5.5.6.4741 certificate validation (qsa-25-09 / EUVD-2025-17344)
CVE-2025-22486 | QNAP File Station 5.5.6.4741 certificate validation (qsa-25-09 / EUVD-2025-17343)
CVE-2025-22482 | QNAP Qsync Central 4.3.0.11/4.4.0.15/4.4.0.16_20240819 format string (qsa-25-10 / EUVD-2025-17341)
CVE-2025-5748 | WOLFBOX Level 2 EV Charger Tuya Communications Module routine (ZDI-25-327 / EUVD-2025-17312)
New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of Chromium-based browsers such as Google Chrome, Microsoft Edge, and others. Dubbed “RustStealer” by cybersecurity researchers, this sophisticated malware is designed to extract sensitive data, including login credentials, cookies, and browsing history, from infected systems. Emerging […]
The post New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-5747 | WOLFBOX Level 2 EV Charger MCU Command Parser interpretation input (ZDI-25-326 / EUVD-2025-17326)
CVE-2025-29872 | QNAP File Station 5.5.6.4847 allocation of resources (qsa-25-16 / EUVD-2025-17336)
CVE-2025-22484 | QNAP File Station 5.5.6.4847 allocation of resources (qsa-25-16 / EUVD-2025-17339)
CVE-2025-22481 | QNAP QTS/QuTS hero prior 5.2.4.3079 Build 20250321 command injection (qsa-25-12 / EUVD-2025-17340)
CVE-2024-56805 | QNAP QTS/QuTS hero prior 5.2.4.3079 Build 20250321 buffer overflow (qsa-25-12 / EUVD-2024-54653)
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details
Korean cybersecurity researchers have uncovered a sophisticated malware campaign targeting cryptocurrency users worldwide, with ViperSoftX emerging as a persistent threat that continues to evolve its attack methodologies. First identified by Fortinet in 2020, this malware has demonstrated remarkable longevity and adaptability, consistently updating its techniques to bypass security measures while maintaining its core objective of […]
The post Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details appeared first on Cyber Security News.
Wireshark Filters
Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts
A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals, ranging from individual hackers to state-sponsored Advanced Persistent Threat (APT) groups like Russia-linked APT28 and Iran-affiliated MuddyWater. This method targets human end users as the weakest link in cybersecurity defenses, tricking them into executing malicious commands through seemingly benign prompts. A […]
The post Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
抗日战争在总参谋部
Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User
Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated by a single threat actor associated with the email address ischhfd83[at]rambler[.]ru. Initially sparked by a customer inquiry into the Sakura RAT, a supposed open-source malware touted for its “sophisticated anti-detection capabilities,” the investigation revealed a much broader and more insidious campaign. […]
The post Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.