Tech News Blog

0

Unremovable Spyware: New Android Threat Emerges

Amid the growing proliferation of consumer-grade surveillance apps for smartphones, it has become increasingly evident that such software is evolving to be more covert and significantly harder to remove. A newly discovered Android application,...

Gootloader malware 0

Gootloader Ads: Legal Templates Hide Malicious JavaScript

The Gootloader malware campaign has once again drawn attention — this time, the attackers have adopted a more sophisticated strategy by distributing malicious advertisements via the Google Ads platform. Their primary targets are legal...

RaccoonO365 0

RaccoonO365: Phishing Wave Targets Credentials & Malware

Phishing campaigns timed to coincide with the U.S. tax season have intensified, with Microsoft reporting large-scale waves of malicious emails leveraging tax-related themes to steal data and deploy malware. What sets these campaigns apart...

ImageRunner 0

ImageRunner: GCP Flaw Exposes Cloud Run Container Images

Cybersecurity researchers have disclosed a recently remediated vulnerability in Google Cloud Platform (GCP) that affected the Cloud Run service. This flaw allowed malicious actors to gain unauthorized access to container images and inject malicious...

AI Phishing 0

Phishing Surge: AI Attacks Outpace Human Red Teams

According to a new report by Hoxhunt, as of March 2025, artificial intelligence has, for the first time, demonstrably outperformed top cybersecurity professionals in the realm of social engineering. This revelation stems from a...

0

Single & Double Flux: Unmasking Evolving Cyber Threats

Federal cybersecurity agencies have issued a call to organizations and DNS providers to strengthen defenses against Fast Flux—an evasion technique increasingly employed by both state-sponsored hackers and ransomware operators. Though long known, Fast Flux...

Proton66 0

Proton66: Novice Hackers, Potent Malware, and Coquettte’s Trail

Researchers have uncovered a growing threat stemming from the Proton66 network — a hosting platform offering so-called “bulletproof” services increasingly favored by novice cybercriminals for disseminating malware and supporting other illicit ventures. At the...

CVE-2025-31334 0

WinRAR Flaw: Bypassing Windows MotW, Code Execution Risk

A vulnerability has been discovered in the WinRAR archiving utility that allows the circumvention of Windows’ “Mark of the Web” (MotW) security mechanism, potentially leading to the execution of malicious code. The issue was...

Google Quick Share Flaw QuickShell 0

Google Quick Share Flaws: Zero-Click Attack Revealed

Researchers at SafeBreach have uncovered critical vulnerabilities in Google Quick Share’s file transfer feature, which could allow threat actors to remotely execute malicious code on Windows systems — entirely without user interaction. Although Google...

CVE-2025-30065 0

Apache Parquet Flaw: 10.0 CVSS Score, Urgent Patch Needed

A critical vulnerability has been identified in Apache Parquet—an open data storage format widely used in analytics and big data processing ecosystems. Catalogued as CVE-2025-30065, the flaw received a perfect CVSS v4 score of...

Abracadabra Finance cyberattack CVE-2025-22457 0

UNC5221 Exploits Ivanti: Patch Now Against RCE

Ivanti has released security updates to address a critical remote code execution (RCE) vulnerability affecting its Connect Secure gateways. The flaw, tracked as CVE-2025-22457 and carrying a CVSS score of 9.0, has already been...