Loading
Yanuki
KEYWORD TOPIC
JS#SMUGGLER Campaign Deploys NetSupport RAT via Compromised Websites | Lazarus APT Remote-Worker Scheme Captured Live | Salesforce Data Breach Impacts Over 200 Companies Via Gainsight | 7-Zip RCE Vulnerability (CVE-2025-11001) Under Active Exploitation | Malicious VS Code Extension and NPM Packages Target Developers | Ukraine Phishing Campaign and Cisco Firewall Vulnerabilities | SonicWall Blames State-Sponsored Hackers for September Security Breach | AI Chatbot Vulnerabilities: How Average Users Can Bypass Safety Measures | JS#SMUGGLER Campaign Deploys NetSupport RAT via Compromised Websites | Lazarus APT Remote-Worker Scheme Captured Live | Salesforce Data Breach Impacts Over 200 Companies Via Gainsight | 7-Zip RCE Vulnerability (CVE-2025-11001) Under Active Exploitation | Malicious VS Code Extension and NPM Packages Target Developers | Ukraine Phishing Campaign and Cisco Firewall Vulnerabilities | SonicWall Blames State-Sponsored Hackers for September Security Breach | AI Chatbot Vulnerabilities: How Average Users Can Bypass Safety Measures

Cybersecurity / Cyber Attacks

JS#SMUGGLER Campaign Deploys NetSupport RAT via Compromised Websites

Cybersecurity researchers have uncovered a sophisticated campaign named JS#SMUGGLER that leverages compromised websites to distribute the NetSupport RAT (Remote Access Trojan). This multi-stage attack grants cybercriminals extensive control...

Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
JS#SMUGGLER Campaign Deploys NetSupport RAT via Compromised Websites Image via The Hacker News
TOPIC cybersecurity news today

Cybersecurity / Threat Intelligence

Lazarus APT Remote-Worker Scheme Captured Live

A joint investigation has uncovered North Korea's Lazarus Group's infiltration scheme using remote IT workers. Researchers captured operators live, revealing their tactics on controlled sandbox environments, highlighting a sophisticated met...

Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera

Security / Data Breach

Salesforce Data Breach Impacts Over 200 Companies Via Gainsight

A significant data breach has impacted over 200 companies using Salesforce, stemming from a vulnerability in apps published by Gainsight, a customer support platform provider. This supply chain attack highlights the increasing risks associa...

Salesforce says customer data possibly exposed following incident

Vulnerabilities / Exploits

7-Zip RCE Vulnerability (CVE-2025-11001) Under Active Exploitation

A remote code execution (RCE) vulnerability in 7-Zip, identified as CVE-2025-11001, is actively being exploited in the wild. This flaw allows attackers to execute arbitrary code on affected systems. It is crucial to update 7-Zip to version...

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Security / Malware

Malicious VS Code Extension and NPM Packages Target Developers

The software development ecosystem is facing increased threats from malicious actors. Recent incidents involve a VS Code extension with ransomware capabilities and NPM packages distributing information-stealing malware, highlighting the imp...

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

Cyber Attacks / Vulnerabilities

Ukraine Phishing Campaign and Cisco Firewall Vulnerabilities

This article summarizes two critical cybersecurity updates: a phishing campaign targeting Ukrainian entities and newly discovered vulnerabilities in Cisco firewalls. Stay informed to protect your systems and data.

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

Security / Data Breach

SonicWall Blames State-Sponsored Hackers for September Security Breach

SonicWall has officially attributed the September security breach, which led to the unauthorized exposure of firewall configuration backup files, to state-sponsored threat actors. The company's investigation, conducted with Mandiant, conclu...

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

AI / Model Security

AI Chatbot Vulnerabilities: How Average Users Can Bypass Safety Measures

Recent research highlights significant vulnerabilities in AI chatbots, demonstrating that even non-technical users can bypass safety measures and elicit biased or unintended responses. This exposes potential risks in various applications of...

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

Security / Malware

SesameOp: Novel Backdoor Uses OpenAI Assistants API for Command and Control

Microsoft researchers have uncovered a new backdoor, dubbed SesameOp, that leverages the OpenAI Assistants API for command-and-control (C2) communications. This innovative approach allows threat actors to stealthily communicate and orchestr...

SesameOp: Novel backdoor uses OpenAI Assistants API for command and control

Cybersecurity / Vulnerabilities

SleepyDuck Malware and BADCANDY Attacks Target Developers and Cisco Devices

Cybersecurity researchers have uncovered two significant threats: the SleepyDuck malware targeting Solidity developers via a malicious VS Code extension, and ongoing BADCANDY attacks exploiting a critical vulnerability in Cisco IOS XE devic...

Malicious VSX Extension "SleepyDuck" Uses Ethereum to Keep Its Command Server Alive

Security / Vulnerability

BADCANDY Malware Re-infects Unpatched Cisco Devices

Cybersecurity experts are warning of ongoing attacks targeting unpatched Cisco IOS XE devices. Attackers are using the BADCANDY malware to gain control of vulnerable systems, and they are even able to detect and re-exploit devices after the...

Malware implant authors can see you delete their evil code

Security / Endpoint Security

macOS Security Layer Targets Admin Errors

ThreatLocker has released Defense Against Configurations (DAC) for macOS, aiming to proactively identify and address common misconfigurations that attackers often exploit. This new security layer helps organizations secure their macOS envir...

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do