Cybersecurity

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs 

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs 

Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor.
According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP archive as a way to trigger the infection. The cybersecurity company’s analysis is based on the ZIP

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT 

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT 

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins).
“The campaign relied on phishing emails with PDFs that contained embedded malicious links,” Pei Han Liao, researcher with Fortinet’s FortiGuard

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware 

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware 

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset.
That’s according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the functions of BeaverTail and OtterCookie coming

Identity Security: Your First and Last Line of Defense 

Identity Security: Your First and Last Line of Defense 

The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe.
This isn’t some dystopian fantasy—it’s Tuesday at the office now. We’ve entered a new phase where autonomous AI agents act with serious system privileges. They

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices 

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices 

Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code.
The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign 

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign 

Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks.
The certificates were “used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware,” the Microsoft Threat Intelligence team said in a post shared on X.
The tech

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts 

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts 

A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method.
The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites 

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites 

A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems.
“UNC5142 is characterized by its use of compromised WordPress websites and ‘EtherHiding,’ a technique used

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets 

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets 

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv.
“This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X