Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets

Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets Cheap Android smartphones mainly from Chinese manufacturers have been found preloaded with trojanized versions of WhatsApp and Telegram. These malicious apps contain clipper malware that targets cryptocurrency users by intercepting clipboard data and swapping wallet addresses. The malware also steals mnemonic phrases from images, hijacks […]
Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses

Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses Security researchers have uncovered a sophisticated new malware technique called Waiting Thread Hijacking (WTH). This stealthy method is an advanced form of classic Thread Execution Hijacking, designed to evade detection by Endpoint Detection and Response (EDR) systems and antivirus solutions. WTH manipulates waiting threads in Windows Thread […]
Beware Fake PDF Converters: Malware Stealing Passwords

Beware Fake PDF Converters: Malware Stealing Passwords A highly targeted malware campaign is exploiting users’ trust in online file conversion services by mimicking the legitimate platform pdfcandy.com. The attack utilizes fake PDF-to-DOCX converters designed to deceive victims into running a malicious PowerShell script, which installs Arechclient2, a variant of the SectopRAT infostealer. This malware is […]
Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access

Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access CrushFTP versions 9.x, 10.x up to 10.8.4, and 11.x up to 11.3.1 are affected by two critical vulnerabilities: CVE-2025-32102 (Server-Side Request Forgery) and CVE-2025-32103 (Directory Traversal). The SSRF flaw stems from improper validation of telnetSocket requests, allowing arbitrary port scanning. The Directory Traversal issue […]
Beware of Malicious Campaigns with HR and Target Employee Trust

Beware of Malicious Campaigns with HR and Target Employee Trust Cybercriminals are taking advantage of Q1 performance evaluations by sending HR-themed phishing emails that impersonate “Human Capital” departments. These deceptive messages create a false sense of urgency and authority, prompting employees to click on malicious links leading to a JotForm survey and a fake Microsoft […]
Critical Remote Vulnerability in Gladinet CentreStack and Triofox Actively Exploited

Critical Remote Vulnerability in Gladinet CentreStack and Triofox Actively Exploited In March 2025, a critical vulnerability identified as CVE-2025-30406 was discovered in Gladinet CentreStack and Triofox platforms. This flaw, stemming from the use of hardcoded cryptographic keys in the web.config files, allows attackers to perform remote code execution (RCE) by exploiting ASP.NET ViewState deserialization. The […]
Apple Fixes Critical macOS Vulnerability April Security Update

Apple Fixes Critical macOS Vulnerability April Security Update Apple has released an urgent security patch to address a critical vulnerability (CVE-2025-24280) affecting macOS Sequoia and macOS Sonoma. This kernel-level flaw, disclosed on April 3, 2025, impacts systems running macOS Sequoia versions prior to 15.4 and macOS Sonoma versions prior to 14.7.5. The vulnerability allows potentially […]
Fortinet Urges Immediate Action on Critical FortiSwitch Vulnerability

Fortinet Urges Immediate Action on Critical FortiSwitch Vulnerability In a recent advisory, Fortinet has sounded the alarm over a critical vulnerability affecting its popular FortiSwitch product line. Tracked as CVE-2024-48887 and rated 9.3 on the CVSS v3 scale, the flaw opens the door for unauthenticated attackers to remotely change the admin password on a FortiSwitch […]
Cisco Patches Two High-Severity Flaws in ECE and Meraki VPN Devices

Cisco Patches Two High-Severity Flaws in ECE and Meraki VPN Devices Cisco has released security updates to fix two newly discovered high-severity vulnerabilities (CVE-2025-20139) and (CVE-2025-20212) impacting its Enterprise Chat and Email (ECE) platform and Meraki MX/Z Series VPN devices. Both flaws could be exploited to cause Denial-of-Service (DoS) conditions, potentially leading to service outages […]
PoisonSeed – A Sophisticated Phishing Campaign Seeks Extensive Crypto Theft

PoisonSeed – A Sophisticated Phishing Campaign Seeks Extensive Crypto Theft PoisonSeed is a sophisticated phishing campaign uncovered by threat analysts, targeting enterprise organizations, VIPs, and cryptocurrency holders. Active in March 2025, it exploits CRM and bulk email providers like Mailchimp, SendGrid, and HubSpot to steal email lists and distribute spam. This includes a unique phishing […]