Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows
30
Jun
2025

Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows

A sophisticated phishing campaign has emerged, distributing the notorious Remcos Remote Access Trojan (RAT) through the DBatLoader malware. This attack…

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog
30
Jun
2025

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 30, 2025 U.S. Cybersecurity and…

What the NULL?! Wing FTP Server RCE (CVE-2025-47812)
30
Jun
2025

What the NULL?! Wing FTP Server RCE (CVE-2025-47812)

While performing a penetration test for one of our Continuous Penetration Testing customers, we’ve found a Wing FTP server instance…

China helps North Korean operatives land IT roles, bypassing sanctions
30
Jun
2025

US authorities unmask North Korean IT worker schemes and their American accomplices

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. The Department…

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords
30
Jun
2025

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords

The Pi Network community eagerly celebrated Pi2Day, an event traditionally associated with platform updates, feature launches, and significant milestones. However,…

Arrest, seizures in latest U.S. operation against North Korean IT workers
30
Jun
2025

Arrest, seizures in latest U.S. operation against North Korean IT workers

U.S. authorities unsealed indictments, seized financial accounts and made an arrest in the latest attempt to crack down on North…

Germany asks Google, Apple remove DeepSeek AI from app stores
30
Jun
2025

Germany asks Google, Apple to remove DeepSeek AI from app stores

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application…

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads
30
Jun
2025

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads

DragonForce Ransomware has emerged as a formidable player in the Ransomware-as-a-Service (RaaS) landscape since its debut in December 2023. Initially…

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords
30
Jun
2025

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords

Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute malware and steal cryptocurrency wallet credentials, targeting users…

Senator Chides FBI for Weak Advice on Mobile Security – Krebs on Security
30
Jun
2025

Senator Chides FBI for Weak Advice on Mobile Security – Krebs on Security

Agents with the Federal Bureau of Investigation (FBI) briefed Capitol Hill staff recently on hardening the security of their mobile…

Protecting Financial Integrity in the Digital Age
30
Jun
2025

Protecting Financial Integrity in the Digital Age

The rise of sophisticated digital tools and artificial intelligence has revolutionized many aspects of business and finance, but it has…

Europol helps disrupt $540 million crypto investment fraud ring
30
Jun
2025

Europol helps disrupt $540 million crypto investment fraud ring

Spanish authorities have arrested five individuals in Madrid and the Canary Islands, suspected of laundering $540 million (€460 million) from illegal…