
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
1 day ago · Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customers.
Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time
1 day ago · How proactive SOCs use threat intelligence, industry context, and hybrid attack visibility to reduce noise and anticipate real threats.
Security Advisories - Cisco
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and …
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000
1 day ago · GhostPoster malware hid inside 17 Firefox add-ons, abusing logo files to hijack links, inject tracking code, and run ad fraud.
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 …
1 day ago · SonicWall released fixes for an actively exploited SMA 100 vulnerability enabling privilege escalation and chained root access attacks.
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS ...
10 hours ago · Cisco confirms an unpatched CVSS 10.0 zero-day in AsyncOS actively exploited to gain root access on email security appliances.
CISA Flags Critical ASUS Live Update Flaw After Evidence of Active ...
10 hours ago · CISA adds a critical ASUS Live Update vulnerability to its KEV list, citing active exploitation linked to a past supply chain attack.
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as ...
10 hours ago · North Korean group Kimsuky uses QR code phishing sites posing as CJ Logistics to spread DocSwap Android malware with RAT capabilities.
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale ...
1 day ago · Kimwolf botnet infected 1.8 million Android TV devices and issued 1.7 billion DDoS commands, using ENS to hide its control servers.
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake ...
1 day ago · Kaspersky reports ForumTroll phishing attacks targeting Russian academics, using fake eLibrary emails, personalized files & Windows malware delivery.
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential ...
1 day ago · APT28 ran a sustained phishing campaign from June 2024 to April 2025, using fake UKR.net login pages to steal credentials and 2FA codes.
China-Linked Ink Dragon Hacks Governments Using ShadowPad and ...
1 day ago · China-aligned Ink Dragon targets government and telecom networks using ShadowPad and FINALDRAFT malware across Europe, Asia, and Africa.