Malloc Privacy Weekly
This week’s edition of Malloc Privacy Weekly highlights significant cybersecurity threats including the misuse of free VPN apps owned by Chinese companies, a new phishing-as-a-service platform called Lucid, and various malware threats targeting Android devices. The report emphasizes the need for users to be aware of privacy risks and consider enhanced protective measures when using technology.…
Read More
Ivanti patches Connect Secure zero-day exploited since mid-March – PRSOL:CC
Ivanti has addressed a critical remote code execution vulnerability (CVE-2025-22457) in its Connect Secure product, exploited by a China-linked espionage actor. The flaw stems from a stack-based buffer overflow and impacts several versions of Ivanti and Pulse Connect Secure products. Admins are urged to update their systems to the patched version 22.7R2.6 and monitor for signs of compromise.…
Read More
Tiny Habits, Cybersecurity: The Little Things in our Cyber Hygiene
The global spending on cybersecurity is set to exceed .63 trillion by 2029, primarily due to basic cybersecurity failures rather than sophisticated attacks. Common vulnerabilities exploited include those in file transfer software, VPNs, and other systems, highlighting the critical need for organizations to improve their cyber hygiene practices like patching and proper configurations.…
Read More
Inteset Secure Lockdown Multi Application Edition – Vulnerabilities and Hardening Measures
This article discusses vulnerabilities found in Inteset’s “Secure Lockdown — Multi Application Edition,” particularly in its kiosk mode. The author reports issues regarding inadequate security measures that allow unauthorized access to applications like Microsoft Edge, code execution via ClickOnce applications, and local file access vulnerabilities. The responsible disclosure attempts to the vendor were unproductive, leading to public disclosure in coordination with CERT/CC.…
Read More
College Cybersecurity Notes Module 2 The Security Environment
This guide covers essential cybersecurity concepts, including definitions of cybercrime, the principles of cybersecurity, types of threats, vulnerabilities, and secure software development practices. Understanding these elements is crucial for organizations and individuals to strengthen their defenses against increasing cyber threats. Affected: Cybersecurity sector, organizations, individuals

Keypoints :

Cybercrime includes illegal activities performed using computers or the internet, such as hacking and phishing.…
Read More
From Espionage to PsyOps: Tracking Operations and Bulletproof Providers of UACs in 2025
This report details the activities of Russia-aligned intrusion sets UAC-0050 and UAC-0006, which have been engaged in financially and espionage-motivated spam campaigns targeting various entities globally, particularly in Ukraine. They employ psychological operations, utilize malware for financial theft, and rely on bulletproof hosting providers to obfuscate their infrastructure.…
Read More
Dozens of solar inverter flaws could be exploited to attack power grids – PRSOL:CC
This article discusses severe vulnerabilities found in solar inverters from major manufacturers Sungrow, Growatt, and SMA, which could be exploited to control devices or execute code on their cloud platforms. These vulnerabilities pose risks to grid stability and user privacy, as they can be leveraged for attacks that disrupt power generation and demand balance.…
Read More
Beware! Hacker Group Lazarus Deploys Malware Packages on npm Platform; SolarWinds Helpdesk Vulnerability Exposed: Attackers Can Decrypt Sensitive Passwords – Security Bull
A recent security report highlights multiple cyber threats, including the discovery of six malicious npm packages linked to the Lazarus hacker group, which are designed to steal sensitive credentials and deploy malware. Additionally, a serious vulnerability in SolarWinds’ web help desk has been uncovered, allowing attackers to decrypt sensitive credentials.…
Read More
Microsoft Fixes 7 Zero-Days and 57 Vulnerabilities in March 2025 Patch Tuesday – PRSOL:CC
March 2025 Patch Tuesday from Microsoft addresses 57 vulnerabilities, including 6 actively exploited zero-day vulnerabilities. The critical vulnerabilities primarily include remote code execution flaws, and details on other related updates and the context of exploitations are elaborated in this article. Affected: Microsoft products, Windows operating system, Microsoft Edge

Keypoints :

Microsoft’s March 2025 Patch Tuesday released 57 security updates.…
Read More
🚨Cyber Attack Chronicles🚨
The SolarWinds hack, a significant supply chain attack discovered in December 2020, compromised numerous Fortune 500 companies and government agencies, resulting in extensive cybersecurity repercussions. Attackers embedded malicious code into SolarWinds’ Orion software updates, infiltrating thousands of networks and highlighting the vulnerabilities in vendor trust. Affected: Fortune 500 companies, US Government agencies, SolarWinds

Keypoints :

The hack was discovered in December 2020, but the infiltration began as early as March 2020.…
Read More
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
This article discusses a phishing campaign that exploits Signal’s linked devices feature to compromise user accounts. By employing malicious QR codes masked as legitimate resources, attackers can connect victims’ accounts to their own instances, allowing continuous eavesdropping on secure conversations. UNC5792, a suspected Russian espionage group, has been identified as leveraging this technique to gain unauthorized access to Signal accounts.…
Read More
Silk Typhoon: Evolving Tactics in Cyber Espionage
In response to increasing threats, the Chinese cyber-espionage group Silk Typhoon has adjusted its tactics, focusing on IT supply chains, remote management tools, and cloud services. The group targets Managed Service Providers to gain access to multiple organizations, exploiting unpatched applications and zero-day vulnerabilities. The article outlines recommendations for organizations to enhance their defenses against these evolving threats.…
Read More
GZR Observer Daily, Mar 7, 2025
The U.S. has introduced tariffs on Canadian goods, leading to retaliatory actions that may increase costs for 1.5 million customers in border states. This situation mirrors past global economic crises and highlights growing geopolitical tensions, trade wars, and implications for domestic industries. Affected: U.S. customers in border states, Canadian goods

Keypoints :

The U.S.…
Read More
Russian Threat Actor Impersonates EFF to Target Albion Online Players with Stealc and Pyramid C2
A Russian-speaking threat actor has been identified impersonating the Electronic Frontier Foundation (EFF) to target Albion Online players through sophisticated phishing tactics and malware deployment. The campaign employs Stealc and Pyramid C2 malware to steal credentials and compromise player accounts, posing risks such as unauthorized access and loss of in-game assets.…
Read More
The first week of March saw the addition of nine new vulnerabilities to the CISA Known Exploited Vulnerabilities catalog, pointing to increased targeting of enterprise and IT infrastructure. Notably, botnet threats like EnemyBot and Sysrv-K took advantage of these vulnerabilities. Additionally, advanced threat actor Silk Typhoon exploited a zero-day vulnerability in Ivanti Pulse Connect VPN, underscoring the need for adaptive security measures.…
Read More
Firefox 136 Security Update
Mozilla Foundation has released a new version of Firefox (136.0) with various features and security updates including vertical tab support, redesigned sidebars, and an HTTPS-First policy. Security updates address multiple vulnerabilities impacting the browser. Affected: Firefox, Android Firefox, Mozilla Foundation

Keypoints :

New features in Firefox 136.0 include vertical tabs and SmartBlock Embeds.…
Read More
Thursday, March 6, 2025
This article discusses a complex cyberattack employing social engineering tactics alongside commonly used remote access tools, specifically targeting Microsoft Teams and Quick Assist. The attack, reportedly impacting several countries primarily in North America, uses BackConnect malware for persistent control and sensitive data theft. Researchers highlight the importance of strengthening security measures to mitigate such risks.…
Read More