New Malware Exploits

Security researchers have discovered a malware campaign that leverages Microsoft Azure Functions to host its command and control (C2) infrastructure. By abusing a legitimate cloud service, attackers are able to mask their activity, evade traditional security defenses, and maintain persistence within targeted environments. Azure Functions, which allow developers to run lightweight applications without managing servers, […]
NVIDIA NVDebug Tool

Security researchers have uncovered a critical flaw in the NVIDIA NVDebug Tool that could allow attackers to escalate privileges on affected systems. The vulnerability gives threat actors elevated access, enabling them to bypass standard security controls and potentially gain full control of devices. The issue stems from improper privilege handling within the debugging tool, which […]
Fake Browser Extensions

Cybersecurity researchers have discovered a new wave of malicious browser extensions disguised as Madgicx Plus and SocialMetrics targeting Meta Business accounts. These extensions trick users into installing them, then give attackers unauthorized access to advertising accounts, financial data, and sensitive business information. How the Attack Works The fake extensions mimic legitimate marketing and analytics tools, […]
Microsoft Issues Warning

Microsoft has issued a critical warning about a newly discovered vulnerability in Active Directory Domain Services (AD DS) that allows attackers to escalate privileges within enterprise networks. This flaw poses a severe risk to organizations that rely on Active Directory as the foundation for identity and access management infrastructure. What You Need to Know The […]
Salty2FA Phishing Kit

A newly discovered phishing kit called Salty2FA is targeting enterprises across the United States and European Union. It is designed to steal both user credentials and two-factor authentication tokens, giving attackers full access even when multi-factor protections are in place. How Salty2FA Works The kit delivers phishing pages that closely mimic enterprise login portals. Victims […]
You Onboarded the Attacker

What if your next star hire isn’t a trusted employee but an infiltrator? This isn’t phishing – it’s threat actors slipping in during onboarding. Meet Jordan from Colorado. Resume, references and background check all clear. On day one Jordan logs in, joins team meetings, and gets full access to repos, project files, and dev keys. […]
Cyber Espionage Through Impersonation

Recent reports reveal that Chinese-linked espionage groups have been impersonating a U.S. lawmaker to distribute malware and target prominent trade associations. This campaign focused on policy-influencing groups in Washington, including manufacturing, technology, and telecommunications sectors. The attackers used carefully crafted phishing emails that appeared authentic, but instead delivered malicious payloads capable of stealing sensitive information. […]
API Token Risks in SaaS

The increasing reliance on SaaS platforms continues to deliver efficiency and scalability for organizations, but it also introduces risks when sensitive access mechanisms such as API tokens are not fully secured. The recent Dynatrace incident serves as a reminder of how even trusted vendors can face vulnerabilities that impact customers across industries. What Happened Dynatrace […]
Malverising meets GPUGate Malware

A New Wave of Malvertising A recent campaign dubbed GPUGate is raising alarms across industries. Attackers are exploiting Google Ads and malicious GitHub commits to spread a fake GitHub Desktop installer. By hijacking trusted platforms and leveraging sponsored ads, they trick professionals into downloading poisoned software. Hardware-Aware Malware What sets GPUGate apart is its reliance […]
WAF Bypass Uncovered

Security researchers have uncovered a sophisticated technique to bypass Web Application Firewalls (WAFs) by combining JavaScript injection with HTTP parameter pollution. This bypass method exploits parsing inconsistencies between firewalls and backend frameworks, allowing malicious payloads to evade detection and execute within the target application. Implications for Key Industries Financial services: Compromised communication channels can lead […]