New Ransomware Operator Exploits Fortinet Vulnerability Duo
Forescout Research has identified a new ransomware strain, dubbed SuperBlack, linked to the threat actor “Mora_001”, exploiting vulnerabilities in Fortinet devices. This threat actor is connected to the LockBit ransomware ecosystem and demonstrates sophisticated tactics including rapid ransomware deployment, user account creation across victim networks, and the use of modified LockBit tools.…
Read More

Summary: The video discusses episode 839 of the Simply Cyber Daily Cyber Threat Brief, where the host shares insights from a mobile studio while preparing for a speaking engagement at Dakota Con. The episode covers a range of cybersecurity news topics, including a data breach at SpyX, a vulnerability in backup software, the use of spyware by law enforcement, and an ongoing Microsoft Windows zero-day vulnerability.…
Read More
Veeam RCE bug lets domain users hack backup servers, patch now
Summary: Veeam has released a patch for a critical remote code execution vulnerability (CVE-2025-23120) affecting its Backup & Replication software, particularly in domain-joined installations. The flaw enables attackers to execute harmful code through a deserialization vulnerability in specific .NET classes. Organizations are urged to upgrade to the latest version to mitigate potential exploitation risks.…
Read More
CISA Warns of Three Actively Exploited Security Vulnerabilities in IoT, Backup, and Enterprise Systems
Summary: The Cybersecurity and Infrastructure Security Agency (CISA) has added three critical vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting significant active threats in the cybersecurity landscape. The vulnerabilities impact Edimax IP cameras, NAKIVO Backup and Replication software, and SAP NetWeaver, each of which poses serious risks of system exploitation and data compromise.…
Read More
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model
Summary: Effective cybersecurity is essential for organizations, particularly those utilizing cloud services like Microsoft 365. Understanding the shared responsibility model helps define security roles between cloud providers and users, ensuring comprehensive protection. This guide outlines critical actions organizations should take to secure their digital assets, implement robust authentication, and establish effective data protection measures.…
Read More
Veeam Patches Critical Vulnerability in Backup & Replication
Summary: Veeam has released patches for a critical vulnerability, CVE-2025-23120, in its Backup & Replication software that could allow remote code execution by authenticated domain users. The issue stems from inadequate deserialization procedures within the product, making it susceptible to exploitation. Users are advised to upgrade to the latest version 12.3.1 to mitigate risks associated with this flaw.…
Read More
Critical RCE Vulnerability Discovered in Veeam Backup & Replication
Summary: A critical-severity vulnerability (CVE-2025-23120) affecting Veeam Backup & Replication can lead to remote code execution by authenticated users, with a CVSS score of 9.9. This flaw impacts version 12.3.0.310 and all earlier builds, prompting urgent patching to the newly released version 12.3.1. Organizations are cautioned about the potential threats to data integrity and privilege escalation associated with this vulnerability.…
Read More
How I Wasted 537 Dollars on the SANS Paller Scholarship without Even Being Considered as a Valid Applicant
This article recounts an individual’s challenging experience with the Paller Cybersecurity Scholarship application process, highlighting communication breakdowns, delays in credential validation by partner organizations, and unexpected financial burdens. Despite the scholarship’s promise of substantial professional development in cybersecurity, the author expresses frustration over a lack of accountability and support from SANS Institute, ultimately resulting in an unsuccessful application.…
Read More

Victim: 51talk.com Country : PH Actor: lockbit3 Source: http://lockbit3g3ohd3katajf6zaehxz4h4cnhmz5t735zpltywhwpc6oy3id.onion/post/aJgAPtwsixzCclDC67d9aab3014ca Discovered: 2025-03-18 18:38:11.335325 Published: 2025-03-18 17:32:00.000000 Description :Backup files related to 51Talk operations. Files labeled with “1G” and “9G” indicating different categories or types of backups. Date of backup: January 25, 2025. Each backup file has a unique identifier at the end (e.g.,…
Read More
DHR Health in Texas Faces Cyberattack but Ensures Continuity of Patient Care

Date Reported: 2025-03-15 Country: USA | United States Victim: Comté de Strafford | Strafford County Website: co.strafford.nh.us Information :The communication systems of Strafford County have been offline since Saturday. Officials are currently unaware of the cause of this outage. County offices, including the prosecutor’s department, have lost access to their phones and emails.…
Read More
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers | Google Cloud Blog
Mandiant’s discovery in mid-2024 revealed that the China-nexus espionage group, UNC3886, deployed custom backdoors on Juniper Networks’ Junos OS routers, utilizing various capabilities to maintain long-term access while circumventing security protections. Mandiant urges organizations to upgrade their Juniper devices to mitigate these vulnerabilities and recommends security measures.…
Read More