Ultime Notizie

Debunking OrbitShade: AI-Driven misinformation in Cyber Threat Intelligence
Malware

Debunking OrbitShade: AI-Driven misinformation in Cyber Threat Intelligence

30 May 2025 securebulletin.com

The recent public report dated April 29, 2025, alleging the existence of a state-sponsored malware named OrbitShade targeting satellite infrastructure...
Ransomware attack in MathWorks outage that paralyzed MATLAB
Ransomware

Ransomware attack in MathWorks outage that paralyzed MATLAB

27 May 2025 dark6

When the world’s engineers, scientists, and students logged in to MATLAB on May 18, 2025, many were met with silence—a...
Anatomy of the Winos 4.0 campaign
Malware

Anatomy of the Winos 4.0 campaign

25 May 2025 securebulletin.com

The Winos 4.0 campaign, as dissected by Rapid7, exemplifies the evolving sophistication of contemporary malware operations targeting Chinese-speaking environments. This...
Dero miner container infection campaign
Malware

Dero miner container infection campaign

21 May 2025 securebulletin.com

The recent campaign uncovered by Kaspersky, involving the Dero cryptocurrency miner spreading through containerized Linux environments by exploiting exposed Docker...
Unmasking FrigidStealer: advanced macOS malware analysis and detection
Spyware

Unmasking FrigidStealer: advanced macOS malware analysis and detection

21 May 2025 securebulletin.com

FrigidStealer represents a sophisticated evolution in macOS-targeted malware, combining social engineering with technical evasion tactics to compromise sensitive data. First...
Trojanized KeePass campaign: novel loader and credential theft in ransomware operations
Malware

Trojanized KeePass campaign: novel loader and credential theft in ransomware operations

14 May 2025 securebulletin.com

A recent investigation by WithSecure’s Threat Intelligence team has uncovered a sophisticated malware campaign leveraging a trojanized version of the...
JPEG image FUD ransomware: a way to evades antivirus solutions
Ransomware

JPEG image FUD ransomware: a way to evades antivirus solutions

13 May 2025 securebulletin.com

In a concerning development for cybersecurity professionals, threat actors have begun leveraging a novel Fully UnDetectable (FUD) ransomware attack technique...
New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs
Spyware

New malware LOSTKEYS uncovered in COLDRIVER campaign targeting Western governments and NGOs

12 May 2025 securebulletin.com

The Google Threat Intelligence Group (GTIG) has recently uncovered a sophisticated new malware strain, dubbed LOSTKEYS, deployed by the Russian...
Tactical reality behind the India-Pakistan hacktivist surge
Hacktivism

Tactical reality behind the India-Pakistan hacktivist surge

12 May 2025 securebulletin.com

In May 2025, a wave of hacktivist activity targeting Indian digital infrastructure sparked widespread alarm in media and social networks,...
From PDF invoice to geo-fenced RAT delivery campaign
Phishing

From PDF invoice to geo-fenced RAT delivery campaign

10 May 2025 securebulletin.com

A recent campaign targeting Southern European organizations demonstrates advanced evasion techniques combining social engineering, trusted platforms, and geolocation filtering. The...
Emerging DOGE Big Balls ransomware campaign leverages multi-stage tooling and BYOVD exploits
Ransomware

Emerging DOGE Big Balls ransomware campaign leverages multi-stage tooling and BYOVD exploits

10 May 2025 securebulletin.com

A recent analysis of newly discovered payloads linked to the DOGE Big Balls ransomware operation reveals a complex infection chain...
Stealthy Linux backdoor leveraging residential proxies and NHAS reverse SSH
Vulnerability

Stealthy Linux backdoor leveraging residential proxies and NHAS reverse SSH

4 May 2025 securebulletin.com

A recently discovered Linux backdoor (SHA256: ea41b2bf1064efcb6196bb79b40c5158fc339a36a3d3ddee68c822d797895b4e) employs advanced evasion techniques to bypass detection while establishing persistent access via SOCKS5...