Oracle Cloud Credential Leak

CISA Issues Warning Over Oracle Cloud Credential Leak The US Cybersecurity and Infrastructure Security Agency (CISA) has warned organisations that a January breach of two obsolete Oracle Cloud servers may expose millions of credentials. • Oracle privately told customers that its core Oracle Cloud Infrastructure (OCI) was not compromised, but attackers accessed usernames from legacy […]

Read More

ASUS Routers Critical Security Flaw

ASUS Routers Hit by Critical AiCloud Security Flaw ASUS has disclosed CVE-2025-2492, a critical authentication-bypass flaw (CVSS 9.2) affecting multiple router models that run the AiCloud remote-access feature. A crafted request lets remote attackers execute functions without logging in. ASUS has released patched firmware in the 382, 386, 388 and 102 branches and urges owners […]

Read More

Phishing Kit That Sidesteps Office 365 MFA

SessionShark: The Phishing Kit That Sidesteps Office 365 MFA Security researchers at SlashNext have uncovered “SessionShark,” a new phishing kit for hire that steals Microsoft Office 365 session tokens and lets criminals bypass multi-factor authentication (MFA). Sold on underground markets, SessionShark spins up convincing fake Office 365 login pages. When a victim enters their credentials, […]

Read More

159 Vulnerabilities Exploited in the Wild

Q1 2025: 159 Vulnerabilities Exploited in the Wild – Is Your Firm Still Behind on Patching? Threat-intelligence analysts have counted 159 distinct CVEs actively exploited in the wild during Q1 2025—a 28 percent rise on the same period last year. Nearly half of the in-use flaws date from 2023 or earlier, confirming that organisations still […]

Read More

Small Vulnerabilities Trigger Big Breaches

How Small Vulnerabilities Trigger Big Breaches – Five Lessons from the Front Line A research team from Intruder dissected five real-world security incidents to show how seemingly “low-risk” flaws can snowball into full-scale breaches: 1. SSRF → AWS credential theft – an application followed a 302 redirect to the EC2 metadata service, leaking cloud keys. […]

Read More

Malware Takes Aim at Healthcare Industry

ResolverRat Malware Takes Aim at Healthcare Industry A malicious campaign using ResolverRat malware has been targeting healthcare providers globally, taking advantage of open RDP connections and phishing scams. The malware provides remote access to compromised systems, enabling attackers to exfiltrate medical data and potentially disrupt patient services. Security researchers warn that ResolverRat’s operators appear to […]

Read More

Phishers Use Real-Time Checks to Outsmart Security

Phishers Use Real-Time Checks to Outsmart Security Measures According to the report, cybercriminals have begun using real-time checks within phishing campaigns to determine whether a victim’s system or browser is under active security inspection. By performing quick, automated lookups in the moment a user clicks a malicious link, attackers can decide whether to serve genuine […]

Read More

Fortinet Attackers Staying Hidden Despite Patches

Fortinet Cautions Users: Attackers Staying Hidden in Networks Despite Patches Fortinet has issued a warning that cybercriminals continue to lurk in networks even after organisations have patched known vulnerabilities in Fortinet products. Attackers who exploited older flaws have managed to maintain persistence by using compromised credentials, backdoor accounts, or hidden footholds. Although many organisations patched […]

Read More

TCESB Malware Puts Organisations on High Alert

New TCESB Malware Puts Organisations on High Alert Exploiting ESET Security Scanner Researchers have identified a new strain of malware called TCESB that is being actively deployed by cybercriminals. The malware’s primary functions include data exfiltration and remote code execution, enabling attackers to stealthily obtain sensitive information from targeted systems. TCESB employs updated obfuscation tactics […]

Read More