Threat Actor: Remote attackers | remote attackers Victim: Netgear router users | Netgear router users
Key Point :
Vulnerability CVE-2024-12847 has a CVSS score of 9.8, indicating a severe risk.…Threat Actor: Remote attackers | remote attackers Victim: Netgear router users | Netgear router users
Key Point :
Vulnerability CVE-2024-12847 has a CVSS score of 9.8, indicating a severe risk.…Threat Actor: Phishers | phishers Victim: Microsoft 365 Users | Microsoft 365 Users
Key Point :
Phishing emails use a specific subject line format and urge users to reconfirm passwords.…Threat Actor: Ransomware Groups | Babuk Victim: Organizations using VMware ESXi | VMware ESXi
Key Point :
Ransomware attacks on ESXi servers are increasingly targeting critical file types, including VMDK, VMEM, VSWP, and VMSN files.…Threat Actor: UNC5337 | UNC5337 Victim: Ivanti | Ivanti
Key Point :
A critical vulnerability in Ivanti Connect Secure appliances has been exploited as a zero-day, allowing for remote code execution.…Keypoints :
Proton Mail experienced a worldwide outage due to a surge in database connections during infrastructure migration.…Keypoints :
The box “Escape” is rated Medium and is the author’s first Active Directory machine.…Threat Actor: Unknown | unknown Victim: Users of Microsoft 365 | users of Microsoft 365
Key Point :
Phishing emails use urgent subject lines to prompt immediate user action.…Keypoints :
Initial reconnaissance performed using Nmap to identify open ports and services.…Keypoints :
Acting as a Cyber Threat Intelligence Analyst at PandaProbe Intelligence.…Keypoints :
IoCs are crucial for identifying traces of cyberattacks.…Keypoints :
Ivanti disclosed two high-severity vulnerabilities (CVE-2025–0282, CVE-2025–0283) affecting its products.…Threat Actor: Hellcat Ransomware Group | Hellcat Ransomware Victim: Telefónica | Telefónica
Key Point :
Telefónica’s internal ticketing system was accessed unauthorizedly, leading to a data leak.…Threat Actor: FunkSec | FunkSec Victim: Various organizations | various organizations
Key Point :
FunkSec uses double extortion tactics, combining data theft with encryption to pressure victims.…