A piece of the code inside the vbs file with the last line commented out (Source - Malwarebytes)
15
Nov
2025

Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials

Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive…

Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection
15
Nov
2025

Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection

A new malware family targeting macOS systems has emerged with advanced detection evasion techniques and multi-stage attack chains. Named DigitStealer,…

A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection
15
Nov
2025

A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection

Phishing attacks continue to be one of the most persistent threats targeting organizations worldwide. Cybercriminals are constantly improving their methods…

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog
15
Nov
2025

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 15, 2025 U.S. Cybersecurity and Infrastructure…

15
Nov
2025

Formbook Malware Delivered Using Weaponized Zip Files and Multiple Scripts

A new wave of Formbook malware attacks has appeared, using weaponized ZIP archives and multiple script layers to bypass security…

Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report
15
Nov
2025

Akira Ransomware Targets Over 250 Organizations, Extracts $42 Million in Ransom Payments – New CISA Report

A new advisory from the Cybersecurity and Infrastructure Security Agency reveals that Akira ransomware has become one of the most…

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications
15
Nov
2025

Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Lumma Stealer has emerged as a serious threat in the cybercrime world, targeting users through fake software updates and cracked…

Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover
15
Nov
2025

Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover

Fortinet has issued an urgent advisory warning of a critical vulnerability in its FortiWeb web application firewall (WAF) product, which…

North Korean actor
15
Nov
2025

Five plead guilty to helping North Koreans infiltrate US firms

The U.S. Department of Justice announced that five individuals pleaded guilty to aiding North Korea’s illicit revenue generation schemes, including…

Logitech
15
Nov
2025

Logitech confirms data breach after Clop extortion attack

Hardware accessory giant Logitech has confirmed it suffered a data breach in a cyberattack claimed by the Clop extortion gang,…

Cl0p claims ransomware hit on NHS
15
Nov
2025

Cl0p claims ransomware hit on NHS

NHS England is investigating the possibility that it has fallen victim to a prolific ransomware operation, after the Cl0p (aka…

127 Groups Oppose Changes To GDPR, EU Data Protection Laws
15
Nov
2025

127 Groups Oppose Changes To GDPR, EU Data Protection Laws

A coalition of 127 civil society organizations and trade unions have banded together to oppose proposed changes that they warn…