Medusa ransomware attacks have surged by 42% between 2023 and 2024, with activity continuing to escalate into 2025. Almost twice as many Medusa attacks were observed in January and February 2025 compared to the first two months of 2024, indicating…
Tag: Cyber Security News
New PyPI Malware Tricking Developers To Gain Access To Ethereum Wallets
The Socket Research Team has discovered a sophisticated malicious PyPI package named ‘set-utils’ designed to steal Ethereum private keys from unsuspecting developers. This package, which has been downloaded over 1,000 times since January 29, 2025, disguises itself as a simple…
Threat Actor Allegedly Selling Bruteforcer for Cisco VPN
A threat actor has surfaced on underground forums, allegedly offering tools designed to exploit Cisco VPNs via brute force and credential-checking attacks. These tools, marketed as a “checker” and “bruteforcer,” are tailored to target Cisco VPN services, raising significant cybersecurity…
Researchers Jailbreaked 17 Popular LLM Models To Communicate Sensitive Data
A comprehensive study by Palo Alto Networks’ Unit 42 has revealed that 17 popular generative AI web applications remain vulnerable to various jailbreaking techniques. These vulnerabilities potentially allow malicious actors to bypass AI safety mechanisms to extract sensitive information or…
Phantom Goblin Leveraging Social Engineering Tactics To Deliver Stealer Malware
Cyble Research and Intelligence Labs (CRIL) has identified a sophisticated malware operation named ‘Phantom Goblin’ that employs deceptive social engineering techniques to distribute information-stealing malware. The attack begins with RAR file attachments containing malicious shortcut (LNK) files disguised as legitimate…
New Polymorphic Attack That Mimic Any Chrome Extension Installed On The Browser
SquareX’s research team has recently uncovered a sophisticated browser attack technique that allows malicious extensions to impersonate any extension installed on a victim’s browser. This newly discovered “polymorphic extension attack” creates pixel-perfect replicas of legitimate extensions’ icons, HTML popups, and…
Threat Actors Exploited PHP-CGI RCE Vulnerability To Attack Windows Machines
Cisco Talos recently uncovered a series of sophisticated cyberattacks exploiting a critical PHP vulnerability to compromise Windows machines. The malicious activities conducted by unknown attackers have been ongoing since January 2025, predominantly targeting organizations in Japan across various business sectors…
Thinkware Dashcam Vulnerability Let Attackers Extract the Credentials in Plain-text
A series of critical vulnerabilities in Thinkware’s F800 Pro dashcam has revealed systemic security flaws, including the exposure of user credentials in plain text, default authentication bypasses, and insecure data storage practices. These issues, disclosed between November 2024 and March…
Peaklight Malware Attacking Users To Exfiltrate Login Credentials, Browser History & Financial Data
A sophisticated information stealer known as Peaklight is actively targeting Windows users worldwide. This malware, identified on March 6, 2025, is designed to harvest sensitive information from compromised endpoints, creating significant risks for both individuals and organizations. Peaklight utilizes a…
New North Korean Moonstone Sleet Employs Creative Tactics To Deploy Custom Ransomware
Cybersecurity researchers have identified a sophisticated ransomware campaign attributed to a North Korean threat actor dubbed “Moonstone Sleet.” The group has deployed an advanced custom ransomware strain targeting financial institutions and cryptocurrency exchanges across Southeast Asia and Europe, demonstrating evolving…