ICYMI: 2025-11-06
Latest Headlines
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan
Truffle Security Raises $25 Million for Secret Scanning Engine
DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
Cisco Patches Critical Vulnerabilities in Contact Center Appliance
State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares
AI Browsers Bypass Content PayWall Mimicking as a Human-User
Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery
Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users
New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections
Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload
Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense
ClickFix malware attacks evolve with multi-OS support, video tutorials
Critical Cisco UCCX flaw lets attackers run commands as root
Sandworm hackers use data wipers to disrupt Ukraine’s grain sector
– MTZ