Cyber News & Articles

Cyber News & Articles

Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA 

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control of devices or execute code remotely, posing severe risks to electrical grids. 
The vulnerabilities have been collectively codenamed SUN:DOWN by Forescout Vedere Labs.
“The new vulnerabilities can be

read more
Cyber News & Articles

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection 

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads.
The malware, according to Zscaler ThreatLabz, shares behavioral similarities with another known malware loader known as SmokeLoader. 
“The purpose of the malware is to download and execute second-stage payloads while evading

read more
Cyber News & Articles

Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity 

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is

read more
Cyber News & Articles

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps 

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps.
“PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in a Thursday analysis.
PJobRAT, first

read more
Cyber News & Articles

Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts 

Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems.
“Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers,” Sonatype researcher Ax Sharma said. “However, […] the latest

read more
Cyber News & Articles

Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability 

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zero-day.
The security vulnerability, CVE-2025-2857, has been described as a case of an incorrect handle that could lead to a sandbox escape.
“Following the recent Chrome sandbox escape (

read more
Cyber News & Articles

New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records 

Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake login pages that impersonate about 114 brands.
DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat.
“The threat actor behind

read more
Cyber News & Articles

When Getting Phished Puts You in Mortal Danger 

Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life.

read more
Cyber News & Articles

Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks 

A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play.
The connection stems from the use of a custom tool that’s designed to disable endpoint detection and response (EDR) software on compromised hosts, according to ESET. The EDR killing tool, dubbed EDRKillShifter, was first documented as used by RansomHub actors in

read more

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X