Cyber News & Articles

Cyber News & Articles

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites 

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale.
Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign – dubbed 360XSS – affected over 350 websites,

read more
Cyber News & Articles

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles 

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members.
The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially leaked on February 11, 2025, by an

read more
Cyber News & Articles

SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent 

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it’s clear this isn’t just a human problem—it’s a math problem. There are simply too many threats and security tasks for any SOC to manually handle in a reasonable timeframe. Yet, there is a solution. Many refer to it as SOC 3.0—an

read more
Cyber News & Articles

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems 

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42.
“Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized

read more
Cyber News & Articles

Three Password Cracking Techniques and How to Defend Against Them 

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods. The following are the three common techniques for cracking passwords and how to

read more
Cyber News & Articles

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries 

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT).
The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025. The activity is designed to target the

read more
Cyber News & Articles

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads 

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer.
The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing.
“Although automslc, which has been

read more
Cyber News & Articles

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerabilities in question are as follows –

CVE-2024-49035 (CVSS score: 8.7) – An improper access control

read more
Cyber News & Articles

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile 

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.
LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in

read more
Cyber News & Articles

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware 

Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a new variant of PicassoLoader. 
The threat cluster has been assessed to be an extension of a long-running campaign mounted by a Belarus-aligned threat actor dubbed Ghostwriter (aka Moonscape,

read more

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X