■■■□□ News
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
منبع خبر: TheHackersNews
🔗 مشاهده خبر
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
منبع خبر: TheHackersNews
🔗 مشاهده خبر
■■■□□
Bleeping Computer
ERMAC Android malware source code leak exposes banking trojan infrastructure
🔗 مشاهده خبر
Bleeping Computer
ERMAC Android malware source code leak exposes banking trojan infrastructure
🔗 مشاهده خبر
BleepingComputer
ERMAC Android malware source code leak exposes banking trojan infrastructure
The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform and the operator's infrastructure.
■■■□□
The Record
Casino gaming company Bragg says hackers accessed ‘internal computer environment’
🔗 مشاهده خبر
The Record
Casino gaming company Bragg says hackers accessed ‘internal computer environment’
🔗 مشاهده خبر
therecord.media
Casino gaming company Bragg says hackers accessed ‘internal computer environment’
Bragg Gaming Group said on Monday that it “believes that the data breach was limited to Bragg’s internal computer environment” based on its preliminary investigation.
■■■□□
The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
🔗 مشاهده خبر
The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
🔗 مشاهده خبر
■■■□□
The Record
Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft
🔗 مشاهده خبر
The Record
Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft
🔗 مشاهده خبر
therecord.media
Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft
Hackers are disguising a powerful strain of malware as a ChatGPT desktop application in preparation for ransomware attacks, Microsoft said.
❏ </Mr. SAM/> ❏
■■■□□cybersecuritynews
Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed
🔗 مشاهده خبر
■■■□□cybersecuritynews
Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed
🔗 مشاهده خبر
Cyber Security News
Technical Details of SAP 0-Day Exploitation Script Used to Achieve RCE Disclosed
A zero-day exploit targets SAP NetWeaver ICM, enabling remote code execution, persistent access, and major enterprise security risks.
❏ </Mr. SAM/> ❏
■■■□□cybersecuritynews
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence
🔗 مشاهده خبر
■■■□□cybersecuritynews
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence
🔗 مشاهده خبر
Cyber Security News
Weaponized Python Package Termncolor Attacking Leverages Windows Run Key to Maintain Persistence
Malicious PyPI package 'termncolor' hides backdoors via DLL sideloading and registry tricks, enabling remote code execution.
❏ </Mr. SAM/> ❏
■■■□□cybersecuritynews
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators
🔗 مشاهده خبر
■■■□□cybersecuritynews
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators
🔗 مشاهده خبر
Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators
The U.S. Department of Justice (DoJ) announced the seizure of over $2.8 million in cryptocurrency, $70,000 in cash, and a luxury vehicle linked to Zeppelin ransomware operations.
❏ </Mr. SAM/> ❏
■■■□□SANS Internet Storm Center
ISC Stormcast For Tuesday, August 19th, 2025 https://isc.sans.edu/podcastdetail/9576, (Tue, Aug 19th)
🔗 مشاهده خبر
■■■□□SANS Internet Storm Center
ISC Stormcast For Tuesday, August 19th, 2025 https://isc.sans.edu/podcastdetail/9576, (Tue, Aug 19th)
🔗 مشاهده خبر
SANS Internet Storm Center
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
❏ </Mr. SAM/> ❏
■■■□□cybersecuritynews
Hackers Weaponizing Cisco’s Secure Links to Evade Link Scanning and By-Pass Network Filters
🔗 مشاهده خبر
■■■□□cybersecuritynews
Hackers Weaponizing Cisco’s Secure Links to Evade Link Scanning and By-Pass Network Filters
🔗 مشاهده خبر
Cyber Security News
Hackers Exploit Cisco Secure Links to Evade Link Scanners and Bypass Network Filters
A sophisticated attack campaign uncovered where cybercriminals are weaponizing Cisco's own security infrastructure to conduct phishing attacks.
❏ </Mr. SAM/> ❏
■■■□□SecurityWeek
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield
🔗 مشاهده خبر
■■■□□SecurityWeek
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield
🔗 مشاهده خبر
SecurityWeek
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield
From hacked satellites to nuclear threats in orbit, the battle for dominance beyond Earth is redefining modern warfare and national security.
❏ </Mr. SAM/> ❏
■■■□□cybersecuritynews
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
🔗 مشاهده خبر
■■■□□cybersecuritynews
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
🔗 مشاهده خبر
Cyber Security News
CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks
CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console that is being actively exploited by threat actors in the wild.