CmbLabs Ransomware: The Growing Threat to Data Security

CmbLabs Ransomware: The Growing Threat to Data Security CmbLabs Ransomware is a dangerous malware that encrypts files, appending the “.cmblabs” extension and demanding payment for decryption. It spreads mainly through phishing emails and deceptive downloads, making data recovery nearly impossible without secure backups. Since paying the ransom does not guarantee file restoration, the best defense […]
SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users

SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users SparkCat is a highly sophisticated piece of malware that targets both Android and iOS devices, with the specific aim of stealing sensitive information, particularly cryptocurrency wallet recovery phrases. The malware uses Optical Character Recognition (OCR) technology to scan and extract text from images […]
Enhance Your Defense against Hunter (Prince) Ransomware

Enhance Your Defense against Hunter (Prince) Ransomware Hunter (Prince) Ransomware is a malicious data-encrypting malware that locks files, appends the “.Hunter” extension, and demands a ransom for decryption. It spreads through phishing emails, malicious downloads and software vulnerabilities, making data recovery challenging without backups. Cybersecurity experts strongly discourage paying the ransom, as there is no […]
Microsoft Fixes Critical Vulnerability in Azure Ai Face Service

Microsoft Fixes Critical Vulnerability in Azure Ai Face Service Microsoft has addressed two critical security vulnerabilities: one in Azure AI Face Service (CVE-2025-21415, CVSS 9.9) and another in Microsoft Account (CVE-2025-21396, CVSS 7.5), both of which could enable privilege escalation. The Azure AI Face Service flaw resulted from an authentication bypass, while the Microsoft Account […]
Akira Ransomware Expands Target to Linux and VMware ESXi

Akira Ransomware Expands Target to Linux and VMware ESXi Akira, a Ransomware-as-a-Service (RaaS) group, has quickly established itself as a major cybersecurity threat since emerging in March 2023. The group has executed over 300 attacks in 2024 alone, amassing more than $42 million in ransom payments as of April. Akira primarily targets critical sectors in […]
Apple Fixes Zero-Day Affecting iOS Devices

Apple Fixes Zero-Day Affecting iOS Devices Summary Apple’s recent iOS 18.3 and iPadOS 18.3 updates address numerous security vulnerabilities across various system components, including AirPlay, ARKit, Safari, and WebKit. Notably, these updates fix issues related to privilege escalation, unexpected app termination, and denial-of-service vulnerabilities, which could lead to unauthorized access, arbitrary code execution, and potential […]
Ransomware Actors are Axploiting ESXi Bare-Metal Hypervisors via SSH Tunneling

Ransomware Actors are Exploiting ESXi Bare-Metal Hypervisors via SSH Tunneling Summary Threat actors are targeting VMware ESXi hypervisors by abusing SSH tunneling to establish persistence, facilitate lateral movement, and execute ransomware without detection. These hypervisors, vital to virtualized environments, frequently lack proper monitoring, making them attractive targets. The dispersed logging architecture of ESXi further complicates […]
Critical Vulnerability Discovered in SonicWall SMA 1000 Series

Critical Vulnerability Discovered in SonicWall SMA 1000 Series Summary SonicWall has issued a critical security advisory for its SMA1000 appliances, revealing a high-severity pre-authentication remote command execution vulnerability (CVE-2025-23006) with a CVSS score of 9.8. This flaw, caused by the deserialization of untrusted data, affects Appliance Management Console (AMC) and Central Management Console (CMC) products […]
Zero-day Vulnerability Actively Exploited In Fortinet FortiGate Firewalls

Zero-day Vulnerability Actively Exploited In Fortinet FortiGate Firewalls A campaign targeting Vulnerability (CVE-2024-55591, CVSS 9.6) in Fortinet FortiGate firewalls with management interfaces was exposed on the internet. Threat actors gained unauthorized access via the CLI console and made configuration changes, including adding super admin accounts and modifying SSL VPN settings. Although the exact vulnerability remains […]
Critical Ivanti Buffer Overflow Vulnerability Exploited in the Wild

Critical Ivanti Buffer Overflow Vulnerability Exploited in the Wild CVE-2025-0282(CVSS 9.0) is a critical stack-based buffer overflow vulnerability affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways. The flaw allows unauthenticated remote code execution, and exploitation has been active since December 2024. The vulnerability impacts Ivanti Connect Secure versions before 22.7R2.5, Policy Secure […]