Sunday, April 26, 2026
HomeUncategorized

Uncategorized

New Chaos RaaS Group Using Voice Social Engineering & RMM Abuse for Data Exfiltration

A sophisticated new ransomware-as-a-service operation called Chaos that emerged in February 2025, employing advanced social engineering tactics and legitimate tools to conduct big-game hunting attacks. The group has demonstrated a concerning evolution in ransomware operations by combining traditional spam campaigns with voice-based manipulation techniques,...

Researchers Exploit Cursor Background Agents to Take Control of Amazon EC2 Instance

A concerning vulnerability in Cursor's Background Agents that allowed them to gain complete control over the underlying Amazon EC2 infrastructure. The incident, discovered two weeks after the agents' public release, highlights significant risks in modern SaaS applications that extend beyond traditional desktop boundaries. The attack...

FBI Alerts About Hacker Community Tied to Ransomware-as-a-Service Gangs

The Federal Bureau of Investigation has issued a stark warning about an evolving cybercriminal ecosystem called "Hacker Com," a sophisticated subset of the international threat group known as "The Com." This primarily English-speaking network comprises multiple interconnected criminal organizations whose members, including many minors,...

Metasploit Releases Module for Actively Exploited SharePoint 0-Day Vulnerabilities

A Metasploit exploit module targeting critical zero-day vulnerabilities in Microsoft SharePoint Server that are currently being exploited in the wild. The module, developed by Principal Security Researcher Stephen Fewer, exploits a chained attack leveraging CVE-2025-53770 and CVE-2025-53771 to achieve unauthenticated remote code execution on...

TP-Link NVR Vulnerabilities Allows Attackers to Execute Arbitrary Commands

TP-Link has disclosed critical security vulnerabilities in two of its VIGI network video recorder (NVR) models that could allow attackers to execute arbitrary commands on affected devices. The vulnerabilities, designated as CVE-2025-7723 and CVE-2025-7724, affect the VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2 systems,...

Weidmueller Industrial Router Vulnerabilities Allow Remote Code Execution by Attackers

German industrial automation company Weidmueller Interface GmbH & Co. KG has disclosed multiple critical vulnerabilities affecting its IE-SR-2TX series of security routers that could allow attackers to execute arbitrary commands with root privileges on targeted devices. The vulnerabilities, tracked under five separate CVE identifiers...