Author: TheHackerNews
Threat Actor: Shadow AI Users | shadow AI users Victim: Organizations | organizations
Key Point :
Shadow AI refers to unauthorized use of AI tools within organizations, increasing data security risks.…Threat Actor: MirrorFace | MirrorFace Victim: Various Japanese organizations | Japanese organizations
Key Point :
MirrorFace, also known as Earth Kasha, is a sub-group of APT10 with a history of targeting Japanese entities.…Threat Actor: Cybercriminals | cybercriminals Victim: Organizations | organizations
Key Point :
10.3% increase in encrypted attacks over the past year.…Threat Actor: Unknown | unknown Victim: GFI KerioControl | GFI KerioControl
Key Point :
The vulnerability allows attackers to inject malicious inputs into HTTP response headers, leading to RCE.…Threat Actor: UNC5337 | UNC5337 Victim: Ivanti | Ivanti
Key Point :
CVE-2025-0282 is a stack-based buffer overflow with a CVSS score of 9.0, affecting multiple Ivanti products.…Threat Actor: Muddling Meerkat | Muddling Meerkat Victim: Various sectors including legal, government, and construction | Various sectors
Key Point :
Threat actors are using old, neglected domains to spoof sender addresses and evade security checks.…Threat Actor: N/A | N/A Victim: U.S.…
Threat Actor: Unknown | unknown Victim: Mitel and Oracle | Mitel and Oracle
Key Point :
CVE-2024-41713 (CVSS 9.1) allows unauthorized access to Mitel MiCollab.…Threat Actor: (state-based actors, ransomware actors) | state-based actors, ransomware actors Victim: (Illumina iSeq 100) | Illumina iSeq 100
Key Point :
Firmware vulnerabilities could allow attackers to overwrite system firmware, potentially bricking the device or installing malware.…Threat Actor: Cybercriminals | cybercriminals Victim: Organizations | organizations
Key Point :
Legacy Multi-Factor Authentication (MFA) became obsolete due to vulnerabilities to modern attack techniques like phishing and SIM swapping.…Threat Actor: Unknown | unknown Victim: Moxa | Moxa
Key Point :
CVE-2024-9138 (CVSS 4.0 score: 8.6) allows authenticated users to escalate privileges and gain root access.…Threat Actor: Chinese state-sponsored threat actors | Chinese state-sponsored threat actors Victim: U.S.…
Threat Actor: Unknown | FireScam Victim: Android Users | Telegram
Key Point :
FireScam is distributed via a phishing site that mimics the RuStore app store, delivering a dropper APK that installs the main malware payload.…