Cybersecurity

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ 

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ 

The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This post examines the history and provenance of DSLRoot, one of the oldest “residential proxy” networks with origins in Russia and Eastern Europe.

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers 

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers 

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell.
The activity has been codenamed ZipLine by Check Point Research.
“Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners 

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners 

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners.
The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands 

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands 

Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay screens to display extortion messages.
“A prominent characteristic of the latest variant is its capacity to deploy a full-screen ransomware overlay, which aims to coerce the victim into remitting a ransom payment,” Zimperium zLabs researcher Vishnu Pratapagiri

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps 

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps 

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store.
“Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices,” the company said. “This creates crucial accountability, making it much harder for

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git 

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The list of vulnerabilities is as follows –

CVE-2024-8068 (CVSS score: 5.1) – An improper privilege management vulnerability in Citrix Session Recording

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats 

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats 

A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests.
“This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 

Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially allow an attacker to break out of the confines of a container.
The vulnerability, tracked as CVE-2025-9074, carries a CVSS score of 9.3 out of 10.0. It has been addressed in version 4.44.3.
“A malicious container running on Docker Desktop could access the

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads 

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads 

Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader called UpCrypter.
The campaign leverages “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages,” Fortinet FortiGuard Labs researcher Cara Lin said. “These pages are designed to entice recipients into downloading JavaScript

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X