Malware & Threats

Microsoft Warns of New StilachiRAT Malware

Microsoft Warns of New StilachiRAT Malware 2025-03-19 at 12:00 By Eduard Kovacs Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft. The post Microsoft Warns of New StilachiRAT Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this […]

React to this headline:

Loading spinner

Microsoft Warns of New StilachiRAT Malware Read More »

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft 2025-03-18 at 16:02 By Eduard Kovacs ZDI has uncovered 1,000 malicious .lnk files used by state-sponsored and cybercrime threat actors to execute malicious commands. The post 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft Read More »

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum 2025-03-17 at 20:29 By Ryan Naraine Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum Read More »

100 Car Dealerships Hit by Supply Chain Attack

100 Car Dealerships Hit by Supply Chain Attack 2025-03-17 at 14:17 By Ionut Arghire The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

100 Car Dealerships Hit by Supply Chain Attack Read More »

In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker

In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker 2025-03-14 at 14:48 By SecurityWeek News Noteworthy stories that might have slipped under the radar: Switzerland requires disclosure of critical infrastructure attacks, ESP32 chips don’t contain a backdoor, MassJacker cryptojacking malware. The post In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor

React to this headline:

Loading spinner

In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker Read More »

ClickFix Widely Adopted by Cybercriminals, APT Groups

ClickFix Widely Adopted by Cybercriminals, APT Groups 2025-03-14 at 14:30 By Ionut Arghire The ClickFix technique has been employed by cybercrime and APT groups for information stealer and other malware deployment. The post ClickFix Widely Adopted by Cybercriminals, APT Groups appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

ClickFix Widely Adopted by Cybercriminals, APT Groups Read More »

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 2025-03-13 at 21:08 By Eduard Kovacs A recently disclosed Edimax zero-day vulnerability has been exploited in the wild by Mirai botnets for nearly a year. The post Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Unpatched Edimax Camera Flaw Exploited Since at Least May 2024 Read More »

FreeType Zero-Day Being Exploited in the Wild

FreeType Zero-Day Being Exploited in the Wild 2025-03-13 at 19:24 By Ryan Naraine Meta’s Facebook security team warns of live exploitation of a zero-day vulnerability in the open-source FreeType library.  The post FreeType Zero-Day Being Exploited in the Wild appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

FreeType Zero-Day Being Exploited in the Wild Read More »

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign 2025-03-13 at 17:17 By Ionut Arghire Threat actors are likely targeting Grafana path traversal bugs for reconnaissance in a SSRF exploitation campaign targeting popular platforms. The post Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Grafana Flaws Likely Targeted in Broad SSRF Exploitation Campaign Read More »

DeepSeek’s Malware-Generation Capabilities Put to Test

DeepSeek’s Malware-Generation Capabilities Put to Test 2025-03-13 at 15:01 By Eduard Kovacs Researchers have analyzed the ability of the Chinese gen-AI DeepSeek to create malware such as ransomware and keyloggers. The post DeepSeek’s Malware-Generation Capabilities Put to Test appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

DeepSeek’s Malware-Generation Capabilities Put to Test Read More »

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days 

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  2025-03-11 at 21:03 By Ryan Naraine Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in the wild. The post Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Patch Tuesday: Microsoft Patches 57 Flaws, Flags Six Active Zero-Days  Read More »

New Ballista IoT Botnet Linked to Italian Threat Actor

New Ballista IoT Botnet Linked to Italian Threat Actor 2025-03-11 at 19:05 By Eduard Kovacs Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers.   The post New Ballista IoT Botnet Linked to Italian Threat Actor appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

New Ballista IoT Botnet Linked to Italian Threat Actor Read More »

Mass Exploitation of Critical PHP Vulnerability Begins

Mass Exploitation of Critical PHP Vulnerability Begins 2025-03-10 at 14:02 By Ionut Arghire GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Mass Exploitation of Critical PHP Vulnerability Begins Read More »

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets 2025-03-07 at 10:31 By Eduard Kovacs Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution. The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets Read More »

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist 2025-03-07 at 01:09 By Ryan Naraine The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file. The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist Read More »

BadBox Botnet Powered by 1 Million Android Devices Disrupted

BadBox Botnet Powered by 1 Million Android Devices Disrupted 2025-03-06 at 14:31 By Ionut Arghire A second iteration of the BadBox botnet that affected over one million Android devices has been partially disrupted. The post BadBox Botnet Powered by 1 Million Android Devices Disrupted appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

BadBox Botnet Powered by 1 Million Android Devices Disrupted Read More »

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain 2025-03-05 at 18:02 By Ryan Naraine Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks. The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.

React to this headline:

Loading spinner

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain Read More »

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices 2025-03-05 at 10:31 By Eduard Kovacs The Eleven11bot botnet has been described as one of the largest known DDoS botnets observed in recent years.  The post New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices Read More »

26 New Threat Groups Spotted in 2024: CrowdStrike

26 New Threat Groups Spotted in 2024: CrowdStrike 2025-02-27 at 21:03 By Eduard Kovacs CrowdStrike has published its 2025 Global
Threat Report, which warns of faster breakout time and an increase in Chinese activity.  The post 26 New Threat Groups Spotted in 2024: CrowdStrike appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

26 New Threat Groups Spotted in 2024: CrowdStrike Read More »

Scroll to Top