Cyber News & Articles

Cyber News & Articles

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks 

Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the recent wave of Cl0p data theft attacks.
The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an unauthenticated attacker with network access via HTTP to compromise and take control of the Oracle

read more
Cyber News & Articles

CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief 

Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar.
The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the

read more
Cyber News & Articles

Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day 

Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals.
The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the last three months. It described the traffic as targeted and structured, and aimed

read more
Cyber News & Articles

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer 

A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer.
That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish.
The DNS threat intelligence firm said it has been tracking Detour Dog since August 2023, when

read more
Cyber News & Articles

Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads 

The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others.
“Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it became clear that the author had a

read more
Cyber News & Articles

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL 

Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp.
The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is “engineered for speed and propagation” rather than data theft or ransomware.
“SORVEPOTEL has been observed to

read more
Cyber News & Articles

Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security 

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics.
Passwork 7 introduces significant changes to how credentials are organized, accessed, and managed, reflecting

read more
Cyber News & Articles

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT 

A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT.
Cybersecurity vendor BI.ZONE is tracking the activity under the moniker Cavalry Werewolf. It’s also assessed to have commonalities with clusters tracked as SturgeonPhisher, Silent Lynx, Comrade Saiga,

read more
Cyber News & Articles

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The vulnerability, CVE-2025-4008 (CVSS score: 8.7), is a case of command injection in the Meteobridge web interface that could result in code execution.

read more

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X