Cybersecurity

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool 

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool 

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance.
The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to support the use of the Uyghur

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database 

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerabilities in question are listed below –

CVE-2025-1976 (CVSS score: 8.6) – A code injection flaw

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More 

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More 

What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting — from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider tricks are used to slip past security

How Breaches Start: Breaking Down 5 Real Vulns 

How Breaches Start: Breaking Down 5 Real Vulns 

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder’s bug-hunting team, reveal how attackers turn overlooked flaws into serious security incidents.
1. Stealing AWS Credentials with a Redirect

Server-Side Request Forgery (SSRF) is a

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools 

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools 

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024.
The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among the

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors 

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors 

Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a “critical patch” but deploy a backdoor instead.
WordPress security company Patchstack described the activity as sophisticated and a variant of another campaign observed in December 2023 that employed a fake CVE ploy to breach sites running

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised 

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised 

Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access.
The attacks, first observed by Orange Cyberdefense SensePost on February 14, 2025, involve chaining the below vulnerabilities –

CVE-2024-58136 (CVSS score: 9.0) – An improper protection of alternate path flaw in the Yii PHP

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers 

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers 

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year.
“The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors,” the Microsoft Threat Intelligence team said in an analysis.
The tech giant noted that

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion 

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion 

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS.
The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN).
“LAGTOY can be

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures 

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures 

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process.
“In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X