InvisibleFerret Malware: Technical Analysis
The article discusses the emergence of InvisibleFerret malware, which is being spread through fake job interviews targeting developers in the tech and cryptocurrency sectors. This malware is part of a broader campaign that includes other malware like BeaverTail. InvisibleFerret is designed to steal sensitive information and operates silently, making it difficult to detect.…
Read More
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Summary: The article discusses the common challenges faced in penetration testing, such as lack of visibility, dependence on final reports, and coordination issues among remote teams. It introduces HackGATE, a managed gateway solution designed to enhance transparency and control in pentesting projects. By addressing these challenges, HackGATE aims to improve the quality and thoroughness of penetration tests in the cybersecurity industry.…
Read More
Rising Threat: Surge in Infostealer Malware Compromises Philippine Institutions
Summary: The Philippines is experiencing a significant rise in infostealer malware attacks, particularly targeting educational institutions and government agencies. This malware is designed to extract sensitive data, leading to serious security breaches and risks for both institutions and individuals. Enhanced cybersecurity measures and proactive defenses are urgently needed to combat this growing threat.…
Read More
How Malware Detect Virtual Machines ?
Virtual machines serve as crucial tools for malware analysis, allowing analysts to safely examine malicious code. However, sophisticated malware employs various techniques to detect virtual environments, prompting the need for enhanced security measures to protect against such threats. Affected: malware analysts, cybersecurity sector

Keypoints :

Virtual machines provide a safe environment for malware analysis.…
Read More
Summary: NVISO Labs has identified a sophisticated phishing campaign linked to the Black Basta ransomware group, utilizing Microsoft Teams for social engineering attacks. The campaign employs an email bombing strategy to distract victims before attackers impersonate IT personnel to gain remote access. Once inside, they disable security measures, exfiltrate data, and deploy malware, highlighting the need for proactive detection measures.…
Read More
The Lynx ransomware, identified as a successor to the INC ransomware family, has been actively targeting various industries in the US and UK since July 2024. Operating under a ransomware-as-a-service model, Lynx employs tactics such as phishing, service termination, and double extortion. The ransomware uses robust encryption methods and has shown a significant overlap with its predecessor, INC.…
Read More
Summary: BlackBerry’s QNX Software Development Platform (SDP) has been issued a security advisory (QNX-2024-003) due to multiple vulnerabilities in its image codecs, which could lead to serious security risks including information disclosure, denial of service, and remote code execution. These vulnerabilities affect several versions of QNX SDP and have been assigned high CVSS scores, indicating their severity.…
Read More
A series of critical vulnerabilities have been reported across various platforms, including Aviatrix Controller and Microsoft 365 applications, leading to significant security risks such as unauthorized access and data breaches. Additionally, a new phishing tactic targeting Apple iMessage users and a malicious PyPi package aimed at Discord developers have emerged, highlighting the evolving threat landscape.…
Read More
Summary: Palo Alto Networks has issued a threat briefing on two critical vulnerabilities in Ivanti products, CVE-2025-0282 and CVE-2025-0283, which could allow attackers to execute remote code and escalate privileges. The vulnerabilities affect Ivanti’s Connect Secure, Policy Secure, and ZTA gateway appliances, widely used for remote network connections.…
Read More
Massive Leak of Online Loan User Data Raises Concerns
Victim: Online Loan Platform | Online Loan Platform Price: Not disclosed Data: Usernames, email addresses, phone numbers, loan amounts, financial transaction records

Keypoints :

Massive data breach involving an online loan platform. Exposed sensitive user information, raising concerns about data security and privacy. Leaked database includes usernames, email addresses, phone numbers, loan amounts, and financial transaction records.…
Read More
Researchers Hijack Hacker Backdoors Through Abandoned Infrastructure – CySecurity News – Latest Information Security and Hacking Incidents
Summary: Shadow IT poses significant risks for organizations, as forgotten systems can become entry points for data breaches. Recent research by watchTowr Labs reveals that hackers also leave behind vulnerabilities in abandoned infrastructure, which can be exploited. This study highlights the importance of vigilance in cybersecurity, as both attackers and defenders can make critical mistakes.…
Read More
Job Offer or Cyber Trap Fake CrowdStrike Recruiters Deliver Malware
A recent cybersecurity alert has revealed that fake CrowdStrike recruiters are distributing malware through phishing emails, tricking victims into downloading a malicious executable that installs a cryptocurrency miner. This scam uses a fake recruitment domain to lure job seekers. Affected: CrowdStrike, job seekers, cryptocurrency mining sector

Keypoints :

Fake CrowdStrike recruiters are distributing malware via phishing emails.…
Read More