Cybersecurity researchers have identified a significant evolution in the ACRStealer information-stealing malware, which has been actively distributed since early 2024, featuring enhanced evasion techniques and sophisticated command-and-control (C2) communication methods.
The malware utilizes Google Docs and Steam as C2 infrastructure through a Dead Drop...
Five critical security vulnerabilities in Bloomberg's open-source Comdb2 database that could allow attackers to launch denial-of-service attacks through specially crafted network packets.
The vulnerabilities, affecting version 8.1 of the high-availability database system, have been successfully patched by Bloomberg following responsible disclosure practices.
Three severe null...
A sophisticated global botnet campaign targeting Voice over Internet Protocol (VOIP) devices with default credentials, beginning with an unusual concentration of malicious activity in rural New Mexico.
The investigation, published on July 24, 2025, reveals how approximately 500 compromised devices worldwide are participating in...
A sophisticated supply chain attack targeting Amazon's Q extension for Visual Studio Code successfully embedded malicious system prompts designed to wipe users' local files and AWS cloud resources, exposing critical vulnerabilities in AI development tool security.
The compromised version 1.84.0 briefly contained destructive commands...
A newly uncovered cyber-espionage campaign, dubbed "Operation CargoTalon," is targeting Russia’s aerospace and defense sectors with a technically advanced attack chain.
SEQRITE Labs' APT-Team has identified multiple spear-phishing incidents targeting high-value personnel within the Voronezh Aircraft Production Association (VASO), a significant entity in the...
A significant victory against cybercrime this week through Operation Checkmate, a coordinated effort that successfully seized the primary infrastructure used by the BlackSuit ransomware group.
The operation has effectively dismantled the gang's ability to communicate with victims and distribute stolen data, marking a major...