
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
1 day ago · Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customers.
Fix SOC Blind Spots: See Threats to Your Industry & Country in …
1 day ago · How proactive SOCs use threat intelligence, industry context, and hybrid attack visibility to reduce noise and anticipate real threats.
Security Advisories - Cisco
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and …
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000
1 day ago · GhostPoster malware hid inside 17 Firefox add-ons, abusing logo files to hijack links, inject tracking code, and run ad fraud.
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 …
1 day ago · SonicWall released fixes for an actively exploited SMA 100 vulnerability enabling privilege escalation and chained root access attacks.
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in …
10 hours ago · Cisco confirms an unpatched CVSS 10.0 zero-day in AsyncOS actively exploited to gain root access on email security appliances.
CISA Flags Critical ASUS Live Update Flaw After Evidence of Active ...
10 hours ago · CISA adds a critical ASUS Live Update vulnerability to its KEV list, citing active exploitation linked to a past supply chain attack.
Kimsuky Spreads DocSwap Android Malware via QR Phishing …
10 hours ago · North Korean group Kimsuky uses QR code phishing sites posing as CJ Logistics to spread DocSwap Android malware with RAT capabilities.
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large …
1 day ago · Kimwolf botnet infected 1.8 million Android TV devices and issued 1.7 billion DDoS commands, using ENS to hide its control servers.
New ForumTroll Phishing Attacks Target Russian Scholars Using …
1 day ago · Kaspersky reports ForumTroll phishing attacks targeting Russian academics, using fake eLibrary emails, personalized files & Windows malware delivery.
APT28 Targets Ukrainian UKR-net Users in Long-Running …
1 day ago · APT28 ran a sustained phishing campaign from June 2024 to April 2025, using fake UKR.net login pages to steal credentials and 2FA codes.
China-Linked Ink Dragon Hacks Governments Using ShadowPad …
1 day ago · China-aligned Ink Dragon targets government and telecom networks using ShadowPad and FINALDRAFT malware across Europe, Asia, and Africa.