Oracle privately confirms Cloud breach to customers
Summary: Oracle has confirmed a data breach involving legacy client credentials after attackers exploited vulnerabilities in 2017 systems, affecting user emails and hashed passwords. Despite Oracle’s claims that the breach did not impact Oracle Cloud, evidence suggests otherwise. Additionally, Oracle Health has also experienced a security incident that compromised patient data from U.S.…
Read More
Threat Actor Claims to Sell Sensitive Information Belongs to BajajCapital
Summary: A threat actor has claimed on a dark web forum to possess and sell sensitive data from BajajCapital, potentially affecting millions of customers. The alleged breach includes KYC details, insurance policy data, source code, and various internal documents. If the claims are verified, this incident could have significant repercussions for BajajCapital’s security and customer privacy.…
Read More
Response to CISA Advisory (AA25-093A): Fast Flux: A National Security Threat
This advisory from multiple cybersecurity agencies highlights the ongoing threat of fast flux techniques used by malicious actors, particularly ransomware groups like Hive and Nefilim. These methods complicate detection and disruption, necessitating improved collaboration and enhanced detection mechanisms among organizations. Affected: organizations, Internet service providers, cybersecurity service providers, financial sector, manufacturing sector, transportation sector

Keypoints :

April 3, 2025 advisory published by CISA, NSA, FBI, and other partners.…
Read More
AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock
Summary: The content discusses the barriers to AI adoption in enterprises, particularly the security, legal, and compliance challenges that stall innovation. It explores the importance of effective AI governance and collaboration among security, compliance, and technical teams to facilitate AI implementation. Practical strategies and insights from industry leaders are provided to bridge the gap between AI innovation and governance challenges.…
Read More
My book on Cyber Threat Intel, that never quite made it as a book, Chapter 1.1
This content explores the significance of Cyber Threat Intelligence (CTI) in improving organizational security and understanding the threat landscape. It delves into the motivations of various types of threat actors, their tactics, and how to effectively mitigate risks. The goal is to provide a comprehensive guide that enhances awareness and proactive measures against cyber threats.…
Read More
Understanding Russian Cognitive Warfare
This article explores Russia’s cognitive warfare tactics, rooted in Soviet KGB doctrines, and their modern adaptations involving disinformation and cyber operations. It presents strategies to counter these tactics, including targeted cyber retaliation and strategic communication, utilizing frameworks such as SWOT and DIMEFIL. A comprehensive analysis is provided on the strategic environment and implications of Russian hacktivist groups, along with methods for dismantling them from within.…
Read More
RedCurl’s Ransomware Debut: A Technical Deep Dive
This research by Bitdefender Labs introduces the QWCrypt ransomware campaign, linked to the RedCurl group, marking a significant shift in their tactics from data exfiltration to ransomware. RedCurl has been operating since 2018 but has historically utilized Living-off-the-Land techniques for corporate espionage. Their targeting of specific infrastructures and the use of hypervisor encryption underscores a sophisticated evolution in their operational strategy, raising questions regarding their motivations and business model.…
Read More
8 Zero-Day Vulnerabilities Uncovered in Netgear WNR854T Router
Summary: Security researcher Dylan has revealed eight critical zero-day vulnerabilities in the Netgear WNR854T router, which has been unsupported since its release in 2017. These vulnerabilities range from buffer overflows to command injection flaws, posing severe risks of remote code execution and unauthorized access. The vendor has declined to address the issues due to the device being classified as end-of-life (EOL).…
Read More
Malicious PyPI Package Targets WooCommerce Stores with Automated Carding Attacks
The Socket research team uncovered a malicious Python package named disgrasya on PyPI, designed to automate carding attacks against WooCommerce stores using CyberSource as a payment gateway. This openly malicious tool facilitates the testing of stolen credit card numbers, allowing low-skilled fraudsters to simulate transactions without raising fraud detection alarms.…
Read More
A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware
Ransomware attacks, specifically the so-called Babuk Locker 2.0, have resurfaced in 2025, attributed to groups named Skywave and Bjorka. Investigations reveal that Babuk Locker 2.0 is essentially a rebranding of LockBit 3.0, utilizing similar techniques and targeting high-profile organizations across various sectors. Affected: organizations, government agencies, cybercriminal sectors

Keypoints :

Ransomware threat persists, causing significant organizational disruption.…
Read More

Victim: aosense.com – AO Sense INC. Country : US Actor: babuk2 Source: http:/bxwu33iefqfc3rxigynn3ghvq4gdw3gxgxna5m4aa3o4vscdeeqhiqad.onion/blog/7159bcb51418253e63758ce3bfc6fe27efb04c5123aec9ba64839474d742dffe/ Discovered: 2025-04-02 20:16:55.073122 Published: 2025-04-02 20:15:49.773890 Description : AO Sense INC., a company based in the United States, recently fell victim to a ransomware attack orchestrated by the Babuk2 group. This cyber incident has raised concerns about data security and the potential impact on the company’s operations.…
Read More
Western cyber aid to Ukraine faces strain as Russia’s war drags on
Summary: A recent report highlights the crucial role of international cyber assistance in bolstering Ukraine’s defenses against Russian cyberattacks, but warns of waning Western support as the war progresses. Although significant contributions have been made by the U.S. and private-sector companies, political divides and operational challenges raise concerns about the sustainability of this aid.…
Read More
UK Sets Out New Cyber Reporting Requirements for Critical Infrastructure
Summary: The British government has announced the forthcoming Cyber Security and Resilience Bill aimed at enhancing cybersecurity regulations in response to the increasing threats from cybercriminals and hostile states. This legislation seeks to expand the criteria for reportable incidents, include more entities under regulation, and strengthen the government’s ability to mandate actions for national security.…
Read More
How SSL Misconfigurations Impact Your Attack Surface
Summary: This content discusses the critical importance of properly configuring SSL certificates to mitigate cybersecurity risks, particularly focusing on the vulnerabilities presented by SSL misconfigurations. It highlights that many organizations fail to address these configurations properly, exposing themselves to various cyber threats. The article suggests that using a robust External Attack Surface Management (EASM) solution can significantly enhance an organization’s security posture.…
Read More
Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers
Summary: This guide outlines the importance of NIST compliance for service providers, highlighting how it enhances security, supports regulatory alignment, and differentiates market positioning. It addresses common challenges in achieving compliance and presents a structured step-by-step approach, emphasizing the role of automation in streamlining the process.…
Read More
Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log
Summary: A massive data breach has exposed 144GB of sensitive information from Royal Mail Group, including personally identifiable information and internal documents, linked to a previous compromise at a third-party service provider, Spectos. The breach, carried out by the threat actor “GHNA,” echoes a recent breach involving Samsung, highlighting a concerning trend in supply chain vulnerabilities exacerbated by AI technologies.…
Read More

Victim: crownlaboratories.com Country : US Actor: abyss Source: Discovered: 2025-04-02 09:10:40.324639 Published: 2025-04-02 09:10:38.809995 Description : Crown Laboratories, established in 2000 and headquartered in Johnson City, TN, is a key player in the pharmaceutical industry, offering both ethical over-the-counter (OTC) products and contract manufacturing services. Recently, the company fell victim to a ransomware attack perpetrated by the Abyss hacking group, which has raised concerns about data security and operational disruptions within the organization.…
Read More