Blog

  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

    Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

    An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining.
    The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

    Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

    Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer.
    The malicious package, named “Tracer.Fody.NLog,” remained on the repository for nearly six years. It was published by a user named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,”

  • Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

    Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

    Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025.
    Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has

  • Why Data Security and Privacy Need to Start in Code

    Why Data Security and Privacy Need to Start in Code

    AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their staffing levels remain largely

  • React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

    React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

    The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security.
    “KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a

  • Google to Shut Down Dark Web Monitoring Tool in February 2026

    Google to Shut Down Dark Web Monitoring Tool in February 2026

    Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years after it was launched as a way for users to monitor if their personal information is found on the dark web.
    To that end, scans for new dark web breaches will be stopped on January 15, 2026, and the feature will cease to exist effective February 16, 2026.
    “While the report offered general

  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

    Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

    A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered chatbots like OpenAI ChatGPT, Anthropic Claude, Microsoft Copilot, DeepSeek, Google Gemini, xAI Grok, Meta AI, and Perplexity.
    The extension in question is Urban VPN Proxy, which has a 4.7 rating on the Google Chrome

  • FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

    FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

    Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical flaw that could result in an authentication bypass under certain configurations.
    The shortcomings, discovered by Horizon3.ai and reported to the project maintainers on September 15, 2025, are listed below –

    CVE-2025-61675 (CVSS score: 8.6) – Numerous

  • ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

    ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

    If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently exploiting critical flaws in the daily software we all rely on—and in some cases, they started attacking before a fix was even ready.
    Below, we list the urgent updates you need to install right now to stop these active threats.
    ⚡ Threat of the Week
    Apple and

  • Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

    Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

    Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical disc images.
    The activity, codenamed Operation MoneyMount-ISO by Seqrite Labs, has primarily singled out finance and accounting entities, with those in the procurement, legal, payroll