Cybersecurity

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection 

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection 

A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain.
Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year.
“Typically delivered through phishing emails containing malicious attachments or links,

The Ultimate MSP Guide to Structuring and Selling vCISO Services 

The Ultimate MSP Guide to Structuring and Selling vCISO Services 

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) services—delivering high-level cybersecurity leadership without the cost of a full-time hire.
However, transitioning to vCISO services is not without its challenges

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack 

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack 

Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts.
The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month.
Targets of the campaign include individuals and

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List 

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The flaws are listed below –

CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto Networks PAN-OS

How Phished Data Turns into Apple & Google Wallets 

How Phished Data Turns into Apple & Google Wallets 

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now 

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now 

Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions.
The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below –

CVE-2025-26465 – The OpenSSH client

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks 

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks 

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems.
This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates 

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates 

Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer.
The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher).
TA2727 is a “threat actor that uses fake

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication 

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication 

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices.
Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3.
“An Authentication Bypass Using an Alternate Path or

Debunking the AI Hype: Inside Real Hacker Tactics 

Debunking the AI Hype: Inside Real Hacker Tactics 

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs’ Red Report 2025 which analyzed over one million malware samples, there’s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while AI will certainly start playing a

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X