-
A Go‑based remote administration tool known as Vshell is emerging as a favored alternative to Cobalt Strike among both red teams and threat actors. Though marketed as a legitimate network administration and security testing platform, recent analyses in…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft is expanding its threat detection capabilities by extending Microsoft Defender for Office 365 (MDO) URL click alerting into Microsoft Teams. This critical update allows security teams to detect, investigate, and respond to potentially malicio…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft Defender researchers have uncovered a new campaign that abuses trojanized gaming utilities to deliver multi‑stage malware with remote access, data theft, and payload delivery capabilities. Attackers are masquerading as popular tools such as X…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Juniper Networks has issued an out-of-cycle critical security bulletin addressing a severe vulnerability affecting its PTX Series routers running Junos OS Evolved. The flaw allows an unauthenticated, network-based attacker to execute malicious code wit…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean threat group APT37 is using a new multi‑stage toolset to jump air‑gaps and conduct deep surveillance by abusing removable media, Ruby, and cloud services in a campaign Zscaler ThreatLabz tracks as “Ruby Jumper.” The campaign’s main goal i…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers at Truffle Security discovered that legacy public-facing Google API keys can silently gain unauthorized access to Google’s sensitive Gemini AI endpoints. This flaw exposes private files, cached data, and billable AI usage to …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Agent Tesla continues to cement its status as one of the most persistent remote access trojans (RATs) in the global threat landscape. Known for its data‑stealing capabilities and extensive distribution network, this malware remains a weapon of choice f…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A dangerous new scam is targeting Zoom users by exploiting their trust in video meeting invites. Over just twelve days, 1,437 Windows users unknowingly installed a malicious version of the Teramind monitoring agent after visiting a fake Zoom meeting pa…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Marquis Software Solutions has filed a lawsuit against cybersecurity firm SonicWall, claiming a vulnerability in SonicWall’s cloud backup service led directly to a ransomware attack on its network. Filed in a Texas federal court, the complaint highligh…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Wireshark has released version 4.6.4, delivering security and stability fixes that address several denial‑of‑service risks and multiple crashes in protocol dissectors and tools. The update is recommended for all users, especially analysts working with …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


