#ThreatResearch #CybersecurityNews #CyberAttack #DataBreach #RansomMonitor #Hacked! #Youtube #PoweredbyAI
Threat Research
-
Threat Intelligence Report Mar 18th,– Mar 24th, 2025
-
Part 2: Validating the Breach Oracle Cloud Denied – CloudSEK’s Follow-Up Analysis
-
Detailed Analysis of DocSwap Malware Disguised as Security Document Viewer
-
Technical Advisory: Mass Exploitation of CVE-2024-4577
-
The New Face of PowerShell: Ransomware Powered by PowerShell-Based Attacks
Security News
-
Chinese hackers spent four years inside Asian telco’s networks
-
Next.js Patches a Critical Authorization Bypass Flaw
-
Cybercriminals Exploit Check Point Driver Flaws in Malicious Campaign
-
Nuxt Users Warned of Cache Poisoning Attacks Due to High-Severity Flaw
-
Critical Flaw in kcp Lets Attackers Manipulate Any Workspace
-
Chinese Weaver Ant hackers spied on telco network for 4 years
Cyber Attack & Data Breach
-
Babuk2 Ransomware Attempts Extortion Based on False Claims
-
New VanHelsing ransomware targets Windows, ARM, ESXi systems
-
23andMe files for bankruptcy, customers advised to delete DNA data
-
Police Investigates Ransomware Threat at Teays Valley Christian School in West Virginia
-
23andMe files for bankruptcy, putting customers’ genetic data at risk
Interesting Stuff
-
SQL Injection Exploitation Made Easy: A Practical Guide to SQLMAP
-
Microsoft 365 Copilot For Work: Image Data Exfiltration From SharePoint
-
Cryptojacking: When Hackers Hijack Your Cloud to Mine Money
-
Red Team Tools (Github)
-
The Art of Wi-Fi Hacking & Protection with Aircrack-ng
-
Adversarial AI Digest — 20 March, 2025