Orion Hackers Ransomware, LockBit 3.0 (LockBit Black)

Orion Hackers Ransomware, LockBit 3.0 (LockBit Black) Orion Hackers is a malicious software variant derived from the LockBit 3.0 (LockBit Black) ransomware. It is designed to encrypt data and extort victims by demanding payment for decryption. It propagates via phishing, software vulnerabilities and malicious downloads, making recovery challenging without backups. Paying the ransom does not […]

AWS Exploited by A New “whoAMI” Attack

AWS Exploited by A New “whoAMI” Attack In February 2025, cybersecurity researchers found out attack vector termed “whoAMI” which exploits misconfigurations in the retrieval of Amazon Machine Images (AMIs) within Amazon Web Services (AWS) environments. This attack leverages a name confusion vulnerability Enabling malicious actors to gain unauthorized code execution privileges within targeted AWS accounts. […]

Lazarus Group Deploys Sophisticated Infostealer Malware

Lazarus Group Deploys Sophisticated Infostealer Malware North Korea’s Lazarus Group is targeting software developers and IT experts through an advanced infostealer malware campaign. Utilizing malicious Python scripts, fake job interviews, and social engineering, they steal sensitive data and establish persistent access to systems. The malware incorporates multiple layers of encoding and evasion techniques, ultimately delivering […]

Microsoft Releases Fixes for 63 Flaws and Two Actively Used Zero-Day Vulnerabilities

Microsoft Releases Fixes for 63 Flaws and Two Actively Used Zero-Day Vulnerabilities On February 11th, 2025, Microsoft released a new security update that aims to fix total of 63 security risks, and two zero-day vulnerabilities that are being exploited. Of the 63 identified vulnerabilities, three are classified as critical, 57 are deemed important, and one […]

Ivanti Addresses Critical Vulnerabilities Affecting Several Products

Ivanti Addresses Critical Vulnerabilities Affecting Several Products Ivanti has disclosed critical vulnerabilities in its Connect Secure, Policy Secure, Secure Access Client and Cloud Services Application products. These flaws could enable remote code execution, unauthorized data access and system compromise. The most severe issues include stack-based buffer overflows and OS command injection vulnerabilities. Ivanti strongly advises […]

DeepSeek iOS App has Severe Security Flaws

DeepSeek iOS App has Severe Security Flaws   The DeepSeek app has gained popularity among iPhone users since its launch, even reaching the top of the App Store charts in the US. A recent analysis by researchers has revealed multiple critical vulnerabilities in the DeepSeek iOS app, posing significant risks to individuals, businesses and government […]

Apple Release Urgent Security Update for IOS to Address Critical Zero-Day

Apple Release Urgent Security Update for IOS to Address Critical Zero – Day Apple has recently deployed security patches for IOS on iPhones and iPads that address critical zero-day.  Update: “CVE-2025-24200 “ fixes an authorization issue that allows a physical attacker to disable USB Restricted Mode on a locked device with any IOS device that […]

CmbLabs Ransomware: The Growing Threat to Data Security

CmbLabs Ransomware: The Growing Threat to Data Security CmbLabs Ransomware is a dangerous malware that encrypts files, appending the “.cmblabs” extension and demanding payment for decryption. It spreads mainly through phishing emails and deceptive downloads, making data recovery nearly impossible without secure backups. Since paying the ransom does not guarantee file restoration, the best defense […]

SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users

SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users SparkCat is a highly sophisticated piece of malware that targets both Android and iOS devices, with the specific aim of stealing sensitive information, particularly cryptocurrency wallet recovery phrases. The malware uses Optical Character Recognition (OCR) technology to scan and extract text from images […]

Enhance Your Defense against Hunter (Prince) Ransomware

Enhance Your Defense against Hunter (Prince) Ransomware Hunter (Prince) Ransomware is a malicious data-encrypting malware that locks files, appends the “.Hunter” extension, and demands a ransom for decryption. It spreads through phishing emails, malicious downloads and software vulnerabilities, making data recovery challenging without backups. Cybersecurity experts strongly discourage paying the ransom, as there is no […]