Sunday, May 3, 2026
HomeCyber News

Cyber News

Exploring the Role of Cloud Giants Like Amazon and Microsoft in Concealing Infrastructure Through FUNNULL Admin Accounts

Recent research by Silent Push Threat Analysts, in partnership with Brian Krebs, has brought a sharp focus to the sprawling criminal infrastructure of the so-called Triad Nexus, which is operated through the FUNNULL Content Delivery Network (CDN). This network, run by its administrator Lizhi...

Chinese Cybercriminals Target Microsoft Exchange Servers to Steal Vital COVID-19 Research Data

Houston, July 9, 2025 — In a landmark operation, the U.S. Justice Department announced the arrest of Xu Zewei, a 33-year-old Chinese national and alleged cybercriminal mastermind behind the infamous “HAFNIUM” hacking campaign. Xu, detained in Milan, Italy on July 3 at the US’s behest,...

Android Vulnerability – TapTrap Attack Lets Malicious Apps Evade Permissions and Cause Damage

Researchers from TU Wien and the University of Bayreuth have discovered a critical Android vulnerability called TapTrap that allows malicious apps to bypass the operating system's permission system without requiring any special permissions. This zero-permission attack exploits Android's activity transition animations to trick users...

Iranian Pay2Key Group Leverages PowerShell to Evade Windows Defender and Encrypt Systems

A sophisticated Iranian-backed ransomware operation has emerged as a significant threat to Western organizations, utilizing advanced PowerShell techniques to bypass Windows security systems. Pay2Key.I2P, linked to the notorious Fox Kitten APT group, has rapidly expanded since its February 2025 debut, collecting over $4 million...

Exploiting IIS Hosted Sites – Hackers Leveraging Compromised Machine Keys to Breach Organizations – TGR-CRI-0045

Cybersecurity researchers from Unit 42 have uncovered a sophisticated campaign by an initial access broker (IAB) group dubbed TGR-CRI-0045, which exploits leaked cryptographic keys to gain unauthorized access to organizations running ASP.NET websites. The threat actors leverage compromised Machine Keys to execute malicious payloads...

Government Entities Targeted by DoNot APT with Custom Windows Malware

Security researchers have uncovered a sophisticated cyber espionage campaign targeting European diplomatic institutions, attributed to the DoNot APT group (also known as APT-C-35 and Mint Tempest). The state-sponsored threat actors, believed to have links to India and have been active since 2016, have expanded...