Ultime Notizie

Coinbase faces major Data Breach: $400 Million in potential losses
Databreach

Coinbase faces major Data Breach: $400 Million in potential losses

15 May 2025 dark6

Coinbase, one of the world’s largest cryptocurrency exchanges with over 100 million customers, has disclosed a significant data breach orchestrated...
Katz Stealer: infostealers targets 78+ Chromium and Gecko-based browsers
Spyware

Katz Stealer: infostealers targets 78+ Chromium and Gecko-based browsers

15 May 2025 securebulletin.com

A newly uncovered information stealer, dubbed Katz Stealer, has rapidly emerged as a formidable threat to both enterprise and individual...
Trojanized KeePass campaign: novel loader and credential theft in ransomware operations
Malware

Trojanized KeePass campaign: novel loader and credential theft in ransomware operations

14 May 2025 securebulletin.com

A recent investigation by WithSecure’s Threat Intelligence team has uncovered a sophisticated malware campaign leveraging a trojanized version of the...
China-Linked APTs exploit critical SAP NetWeaver vulnerability to breach over 580 systems globally
Cybercrime

China-Linked APTs exploit critical SAP NetWeaver vulnerability to breach over 580 systems globally

13 May 2025 securebulletin.com

In a significant escalation of cyber-espionage activities, multiple China-affiliated advanced persistent threat (APT) groups have been found actively exploiting a...
JPEG image FUD ransomware: a way to evades antivirus solutions
Ransomware

JPEG image FUD ransomware: a way to evades antivirus solutions

13 May 2025 securebulletin.com

In a concerning development for cybersecurity professionals, threat actors have begun leveraging a novel Fully UnDetectable (FUD) ransomware attack technique...
New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs
Spyware

New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs

12 May 2025 securebulletin.com

The Google Threat Intelligence Group (GTIG) has recently uncovered a sophisticated new malware strain, dubbed LOSTKEYS, deployed by the Russian...
German authorities shut down major crypto-swapping platform “eXch,” seizing €34 million in illicit assets
Cybercrime

German authorities shut down major crypto-swapping platform “eXch,” seizing €34 million in illicit assets

12 May 2025 securebulletin.com

On April 30, 2025, the Frankfurt am Main General Prosecutor’s Office-Central Unit for Combating Internet Crime (ZIT)-in close collaboration with...
Tactical reality behind the India-Pakistan hacktivist surge
Hacktivism

Tactical reality behind the India-Pakistan hacktivist surge

12 May 2025 securebulletin.com

In May 2025, a wave of hacktivist activity targeting Indian digital infrastructure sparked widespread alarm in media and social networks,...
From PDF invoice to geo-fenced RAT delivery campaign
Phishing

From PDF invoice to geo-fenced RAT delivery campaign

10 May 2025 securebulletin.com

A recent campaign targeting Southern European organizations demonstrates advanced evasion techniques combining social engineering, trusted platforms, and geolocation filtering. The...
Emerging DOGE Big Balls ransomware campaign leverages multi-stage tooling and BYOVD exploits
Ransomware

Emerging DOGE Big Balls ransomware campaign leverages multi-stage tooling and BYOVD exploits

10 May 2025 securebulletin.com

A recent analysis of newly discovered payloads linked to the DOGE Big Balls ransomware operation reveals a complex infection chain...
Malicious npm packages hijack macOS Cursor AI IDE
Vulnerability

Malicious npm packages hijack macOS Cursor AI IDE

9 May 2025 securebulletin.com

The Socket Threat Research Team has uncovered a sophisticated supply chain attack targeting macOS developers using the Cursor AI code...
Stealthy Linux backdoor leveraging residential proxies and NHAS reverse SSH
Vulnerability

Stealthy Linux backdoor leveraging residential proxies and NHAS reverse SSH

4 May 2025 securebulletin.com

A recently discovered Linux backdoor (SHA256: ea41b2bf1064efcb6196bb79b40c5158fc339a36a3d3ddee68c822d797895b4e) employs advanced evasion techniques to bypass detection while establishing persistent access via SOCKS5...