Cybersecurity

Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads 

Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads 

The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others.
“Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it became clear that the author had a

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL 

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL 

Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp.
The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is “engineered for speed and propagation” rather than data theft or ransomware.
“SORVEPOTEL has been observed to

Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security 

Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security 

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics.
Passwork 7 introduces significant changes to how credentials are organized, accessed, and managed, reflecting

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT 

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT 

A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT.
Cybersecurity vendor BI.ZONE is tracking the activity under the moniker Cavalry Werewolf. It’s also assessed to have commonalities with clusters tracked as SturgeonPhisher, Silent Lynx, Comrade Saiga,

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild 

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The vulnerability, CVE-2025-4008 (CVSS score: 8.7), is a case of command injection in the Meteobridge web interface that could result in code execution.

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware 

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware 

The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor.
“Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries — especially in Pakistan – using spear-phishing and malicious documents as initial

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown 

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown 

Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems.
The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken down. It was first

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact 

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact 

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results.
The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed off manually to

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More 

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More 

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even finding ways to poison Chrome’s settings to sneak in malicious extensions.
On the defense side, AI is stepping up to block ransomware in real

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X