The GreyNoise team has uncovered a disquieting pattern: in 80% of cases, anomalous spikes in suspicious internet activity occur prior to the official disclosure of new vulnerabilities (CVEs). These are not coincidences or random...
Threat actors operating under the name ShinyHunters have orchestrated a series of cyberattacks targeting major corporations, including Qantas, Allianz Life, LVMH, and Adidas. Each incident centers around attempts to infiltrate client Salesforce environments through...
Attacks linked to the Storm-2603 group continue to raise serious concerns within the cybersecurity community. This relatively obscure yet well-documented group, reportedly associated with China, has been implicated in the exploitation of recently discovered...
In late 2024, a new ransomware strain named FunkSec emerged on the cybercrime scene. It quickly drew attention due to its aggressive tactics and unconventional implementation. Within a short span, dozens of organizations across...
A new report from SentinelOne casts a revealing light on a lesser-known yet extensive facet of China’s cyber-espionage apparatus: the contractor infrastructure tied to the threat group Silk Typhoon (also known as Hafnium), which...
The organizers of the world’s premier hacking competition, Pwn2Own, have announced a reward that has instantly shifted the industry’s spotlight: a staggering $1 million will be awarded for the successful demonstration of a full-fledged...
A critical vulnerability has been discovered in the Cursor source code editor, an AI-powered tool designed to assist programmers. The flaw, identified as CVE-2025-54135 and dubbed CurXecute, affects nearly all versions of the IDE...
Since mid-July, a surge in ransomware attacks leveraging the Akira strain has been observed, specifically targeting SonicWall devices. According to cybersecurity firm Arctic Wolf, threat actors have been actively exploiting SSL VPN connections on...
Email protection mechanisms, originally conceived as a bulwark against malicious links, have ironically become unwitting allies to cybercriminals. Researchers have uncovered a troubling trend: threat actors are increasingly exploiting “link wrappers” provided by platforms...
In the autumn of 2024, the InfoSect bug hunting team prepared a remote code execution attack targeting the Synology TC500 IP camera for entry in the Pwn2Own Ireland competition. The exploitation hinged on a...
A critical vulnerability has been discovered in the widely used WordPress theme “Alone — Charity Multipurpose Non-profit”, which is already being exploited by malicious actors to compromise websites. Tracked as CVE-2025-5394, the flaw has...
In their relentless pursuit of artificial intelligence, companies are neglecting the very foundation of digital resilience—security. This stark conclusion emerges from an IBM analysis of cyberattack data collected over the past year, revealing that...
Researchers at Bitdefender have disclosed two critical vulnerabilities in the firmware of Dahua smart surveillance cameras. These flaws, rooted in the ONVIF protocol implementation and the file upload mechanism, enable attackers to gain full...
Hackers infiltrated a bank’s internal network by installing a Raspberry Pi mini-computer equipped with a 4G modem, enabling remote access to the ATM system in an attempt to steal funds. This was revealed by...
Experts at Darktrace have identified a targeted cyberattack against an American chemical company, in which the perpetrators exploited a critical vulnerability in the SAP NetWeaver platform. Tracked as CVE-2025-31324, the flaw stemmed from an...
A new wave of attacks leveraging the XWorm malware vividly illustrates how far threat actors have advanced in crafting tools that are both resilient to detection and resistant to analysis. The variant identified by...