Iran-Linked MuddyWater Hackers Deploy New “Dindoor” Backdoor to Target U.S. Networks

Cybersecurity researchers have recently uncovered a new cyber campaign linked to the Iranian hacking group known as MuddyWater. The group is believed to have connections with Iran’s Ministry of Intelligence and Security. In this campaign, attackers managed to infiltrate several organizations and quietly place malicious tools inside their systems. Researchers say the hackers used a … Continued

Microsoft Warns of ClickFix Attack Using Windows Terminal to Deploy Lumma Stealer

Microsoft has recently revealed details about a new cyberattack campaign that is using a social-engineering technique called ClickFix. This campaign is designed to infect Windows computers with a well-known malware called Lumma Stealer. Instead of exploiting a software vulnerability, the attackers trick users into running a malicious command themselves. Once the command is executed in … Continued

Global Operation Shuts Down Tycoon 2FA Phishing Service Behind 64,000 Attacks

A major international law-enforcement operation has shut down Tycoon 2FA, a phishing-as-a-service platform used by cybercriminals to steal login credentials and bypass security protections. The operation was led by Europol with support from several cybersecurity companies and technology partners. Authorities targeted the infrastructure that powered the service. As a result, many domains used for phishing … Continued

Mail2Shell Zero-Click Vulnerability Lets Hackers Hijack FreeScout Mail Servers

A new cybersecurity vulnerability called Mail2Shell has been discovered in FreeScout, a popular open-source helpdesk platform used by organizations to manage customer support emails. Security researchers revealed that attackers can exploit this flaw to take control of vulnerable servers. The attack works by sending a specially crafted email to the system. Because of this, even … Continued

Fake Laravel Packages on Packagist Deliver Cross-Platform RAT Targeting Developers

A new cybersecurity threat has been discovered involving fake Laravel packages uploaded to the Packagist repository. These packages pretend to be useful development tools but secretly install malware on a developer’s system. Because Packagist is widely used by PHP developers through Composer, this attack can affect many projects. The malware works across Windows, macOS, and … Continued

APT41-Linked Silver Dragon Launches Cyber-Espionage Campaign Against Governments Using Google Drive C2

Cybersecurity researchers have recently uncovered a cyber-espionage campaign carried out by a threat group known as Silver Dragon. Security analysts believe this group has connections to the Chinese-aligned hacking collective APT41. The campaign has mainly targeted government organizations across Europe and Southeast Asia. Reports suggest that the activity has been ongoing since mid-2024 and focuses … Continued

StegaBin Campaign: 26 npm Packages Abused to Deliver Cross-Platform RAT via Pastebin C2

Cybersecurity researchers have uncovered a new supply chain attack involving 26 malicious npm packages published to the public registry. These packages were disguised as normal developer tools but secretly contained harmful code. The activity has been linked to threat actors associated with North Korea. The campaign specifically targeted developers and software environments. Researchers have named … Continued

ClawJacked Vulnerability Exposed OpenClaw to Website-Based Hijacking and Data Theft

A serious security vulnerability named “ClawJacked” has been discovered in OpenClaw, a popular self-hosted AI agent platform. Security researchers revealed that malicious websites could secretly take control of a user’s locally running OpenClaw instance. This flaw allowed attackers to hijack the AI agent and potentially steal sensitive data. The discovery has raised significant concern within … Continued

Newsletter line