Sign up is now available!

Trending Threats

Real-time cybersecurity threat intelligence feed

1 New Article

Apache OpenOffice Denies Akira Ransomware Breach Claims

5h ago MsnTechradar 100% similarity

Akira ransomware has claimed to have breached Apache OpenOffice, alleging the theft of 23GB of sensitive corporate data. However, Apache has denied these claims, asserting that OpenOffice's open-source nature protects it from such breaches.

AkiraAkira RansomwareCyberattackRansomware
Threat Score 63.5
Click to read more →
3 New Articles

GOLD BLADE Ransomware Campaign Using QWCrypt Locker Identified

7h ago CyberpressGbhackersCybersecuritynews 95% similarity

Between February 2024 and August 2025, Sophos threat analysts identified nearly 40 intrusions linked to the GOLD BLADE ransomware campaign. This campaign utilizes a custom QWCrypt locker for data exfiltration and ransomware deployment, affecting various organizations during this period.

GOLD BladeINCQWCrypt LockerCyber AttackData Exfiltration
Threat Score 60.7
Click to read more →
HOT 3 New Articles

Multiple Vulnerabilities in Windows RRAS Allow Remote Code Execution and Information Disclosure

14h ago Api.Msrc.Microsoft 93% similarity

Three vulnerabilities have been identified in the Windows Routing and Remote Access Service (RRAS). CVE-2025-62549 and CVE-2025-64678 allow unauthorized remote code execution, while CVE-2025-62473 enables information disclosure. These vulnerabilities affect systems utilizing RRAS, potentially exposing them to attacks over a network.

Information DisclosureRemote Code ExecutionBuffer overflowCVE-2025-62473CVE-2025-62549
Threat Score 58.1
Click to read more →
2 New Articles

Critical DoS Vulnerability in python-apt Affects Multiple Ubuntu Releases

10h ago LinuxsecurityUbuntu 84% similarity

A critical denial of service vulnerability has been identified in python-apt, affecting multiple Ubuntu versions including 25.10, 25.04, and several LTS releases. Discovered by Julian Andres Klode, the flaw allows attackers to crash python-apt by exploiting improperly handled deb822 configuration files.

APT 3INCDenial of ServiceDenial Of ServiceDoS
Threat Score 57.4
Click to read more →
1 New Article

Critical Code Injection Vulnerability in SAP Solution Manager Disclosed

7h ago Cyberpress 78% similarity

SAP has released critical security patches addressing a code injection vulnerability in SAP Solution Manager (ST 720), tracked as CVE-2025-42880. This vulnerability is rated Critical and affects users of the affected SAP solutions, necessitating immediate attention to apply the patches.

Code InjectionCVE-2025-42880
Threat Score 54.6
Click to read more →
1 New Article

CISA Adds Two Exploited Vulnerabilities to Catalog

10h ago Cisa 55% similarity

The Cybersecurity and Infrastructure Security Agency (CISA) has added two known exploited vulnerabilities to its catalog. These vulnerabilities affect various systems and could potentially allow unauthorized access or control. Organizations are advised to take immediate action to mitigate these risks.

ExploitShields UpIdaIDAping
Threat Score 53.4
Click to read more →
1 New Article

Burp Suite Enhances Scanner for React2Shell Vulnerabilities

12h ago GbhackersCybersecuritynewsBlog.Portswigger 79% similarity

Burp Suite has upgraded its scanning capabilities to detect critical React2Shell vulnerabilities in JavaScript applications. Both editions of Burp Suite now include the latest detection logic, allowing users to validate their exposure and perform automated scans effectively.

ContiINCCyber AttackExploitHacking
Threat Score 50.9
Click to read more →
2 New Articles

Ruby SAML Vulnerability Allows Authentication Bypass

7h ago CyberpressCybersecuritynews 85% similarity

A critical vulnerability in the Ruby SAML library enables attackers to perform signature wrapping attacks, allowing them to bypass SAML authentication entirely. This flaw affects systems relying on the Ruby SAML library for secure authentication processes. Organizations using this library are urged to assess their security measures and apply necessary updates.

Cyber AttackHackingping
Threat Score 50.2
Click to read more →
1 New Article

Malicious VS Code Extensions Distribute Infostealers to Developers

5h ago Infosecurity-MagazineBleepingcomputer 88% similarity

Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, were found on the VS Code marketplace, capable of stealing screenshots, browser sessions, and stored credentials. The extensions were reported by Koi Security and utilized social engineering tactics to deliver a DLL-based infostealer to developers' machines.

ContiHiveINCMalwareSocial Engineering
Threat Score 50.1
Click to read more →
2 New Articles

openSUSE Leap 15.6 Addresses PostgreSQL 13 Critical Vulnerabilities

13h ago Linuxsecurity 95% similarity

openSUSE Leap 15.6 has released an update for PostgreSQL 13 to address critical vulnerabilities, specifically CVE-2025-12817 and CVE-2025-12818. These vulnerabilities include a missing privilege check in CREATE STATISTICS and an integer overflow in libpq, affecting users of PostgreSQL 13.23.

PythonCVE-2025-12817CVE-2025-12818
Threat Score 48.9
Click to read more →
1 New Article

Data Breach at Western Wayne Discovered on January 30, 2025

6h ago Finance.Yahoo 89% similarity

Western Wayne reported unauthorized activity on January 30, 2025, leading to a data breach. The company has since taken steps to enhance security and is collaborating with a cybersecurity firm to investigate the incident.

Data Breach
Threat Score 48.2
Click to read more →

Multiple Bluetooth Vulnerabilities Addressed in Recent Microsoft Updates

21h ago Api.Msrc.Microsoft 82% similarity

Microsoft has published information on two critical Bluetooth vulnerabilities: CVE-2025-40309 and CVE-2025-39981. The first vulnerability involves a use-after-free (UAF) issue in the SCO connection handling, while the second addresses possible UAFs in the MGMT protocol. Affected systems include those utilizing Bluetooth technology.

UAFCVE-2025-39981CVE-2025-40309
Threat Score 47.7
Click to read more →

Operation FrostBeacon Targets Finance and Legal Sectors with Cobalt Strike Malware

13h ago CybersecuritynewsCyberpress 92% similarity

Operation FrostBeacon is a cybercrime campaign identified by Seqrite Labs, focusing on finance and legal departments. The campaign employs Cobalt Strike malware to compromise organizations, indicating a sophisticated attack strategy. Details on the specific vulnerabilities exploited or the timeline of attacks remain limited.

Cyber AttackHackingMalwareOperation FrostBeaconCobalt Strike
Threat Score 46.6
Click to read more →
3 New Articles

MetaRAT Malware Deployed via Ivanti Connect Secure Vulnerabilities

10h ago CybersecuritynewsCyberpressGbhackers 95% similarity

A China-based advanced persistent threat (APT) group has exploited vulnerabilities in Ivanti Connect Secure to deploy MetaRAT malware. Japan's cybersecurity firm LAC has confirmed the targeted nature of this attack, affecting organizations using the Ivanti platform.

CARRINCCyber AttackExploitHacking
Threat Score 45.2
Click to read more →
HOT 3 New Articles

CTERA Ransom Protect Achieves 100% Detection Against Ransomware

9h ago Finance.YahooGlobenewswireCitybiz.Co 82% similarity

CTERA announced that its Ransom Protect feature has achieved 100% detection rates across leading ransomware families. This AI-driven ransomware prevention solution significantly reduces file encryption and operational impact for users. The CTERA Intelligent Data Platform is now also available in the AWS Marketplace.

RansomwareGlobping
Threat Score 43.9
Click to read more →
3 New Articles

Vishing Attack Uses Microsoft Teams and QuickAssist to Spread .NET Malware

8h ago CybersecuritynewsGbhackersCyberpress 92% similarity

A new vishing attack has been identified that exploits Microsoft Teams and QuickAssist to deploy .NET malware. This attack targets users through social engineering tactics, potentially affecting organizations that utilize these platforms. The malware is designed to compromise systems and steal sensitive information.

INCCyber AttackExploitHackingMalware
Threat Score 43.2
Click to read more →
3 New Articles

Malicious VS Code Extensions Exploit Microsoft Registry to Steal WiFi Passwords

8h ago GbhackersCybersecuritynewsCyberpress 87% similarity

A series of malicious Visual Studio Code extensions have been identified, exploiting vulnerabilities in the Microsoft Registry to steal WiFi passwords and capture screens. Users of Windows systems are particularly affected due to weak registry and process controls that allow these extensions to operate undetected.

INCCyber AttackExploitHackingMalware
Threat Score 42.5
Click to read more →
2 New Articles

Prompt Injection Attack via Malicious MCP Servers Drains System Resources

8h ago CybersecuritynewsGbhackers 79% similarity

A new prompt injection attack has been identified, leveraging malicious MCP servers to drain system resources. This attack targets various systems, potentially affecting numerous organizations and users reliant on these technologies. The exploit allows attackers to manipulate prompts and deplete resources stealthily.

INCCyber AttackHackingMalwarePrompt Injection
Threat Score 41.7
Click to read more →
2 New Articles

New Mirai Botnet Variant ‘Broadside’ Targets Users with Active Attacks

11h ago CybersecuritynewsGbhackers 92% similarity

A new variant of the Mirai botnet, named 'Broadside', has been identified actively attacking users. This variant exploits vulnerabilities in IoT devices, putting a wide range of users at risk. Cybersecurity experts are urging affected individuals to secure their devices against these attacks.

INCBotnetCyber AttackHackingMalware
Threat Score 39.7
Click to read more →
1 New Article

St. Bonaventure University Opens New Cyber Operations Center

6h ago Sbu.Edu 100% similarity

St. Bonaventure University officially opened its Cyber Operations Center on December 1, 2025. The center, funded by a $450,000 federal earmark from U.S. Rep. Nick Langworthy, aims to provide a state-of-the-art training facility for students entering the cybersecurity field. This initiative is seen as a significant investment in both the university and the regional economy.

PlayIATRaySCA
Threat Score 37.7
Click to read more →
Loading more...

Trending Entities

APT Groups
APT 3 ↑ 100%
CARR − 0%
Silver Fox ↑ 100%
Tick ↓ 50%
TICK ↓ 50%
Attack Types
Arbitrary Code Execution − 0%
Backdoor ↓ 50%
Botnet ↑ 100%
Code Injection ↑ 100%
Command Injection ↑ 100%
Campaigns
Operation FrostBeacon ↑ 100%
Shields Up − 0%
Companies
Adobe ↑ 100%
Aeroflot ↑ 100%
Akamai ↑ 100%
Amazon ↑ 100%
Amazon Web Services ↑ 100%
Countries
Canada ↑ 100%
China − 0%
Dominican Republic ↑ 100%
Germany ↑ 100%
Ireland ↑ 100%
CVEs
CVE-2025-12725 ↑ 100%
CVE-2025-12726 ↑ 100%
CVE-2025-12727 ↑ 100%
CVE-2025-12728 ↑ 100%
CVE-2025-12729 ↑ 100%
Industries
Banking ↑ 100%
Consulting ↑ 100%
Cybersecurity − 0%
Defense − 0%
Energy − 0%
Malware
BackDoor ↓ 50%
Bitcoin Black ↑ 100%
Broadside ↑ 100%
Cobalt Strike ↑ 100%
Codo AI ↑ 100%
MITRE
Cross-Site Scripting (xss) ↑ 100%
DLL hijacking ↑ 100%
Exfiltration − 0%
Exploitation − 0%
Go − 0%
Platforms
Active Directory − 0%
Active Directory Federation Services ↑ 100%
AIS − 0%
Android − 0%
Antigravity ↑ 100%
Ransomware
Akira − 0%
Akira Ransomware − 0%
Conti − 0%
GOLD Blade ↑ 100%
Hive ↑ 100%
Tools
ACME ↑ 100%
Agents SDK ↑ 100%
Bambda ↑ 100%
Bun − 0%
Burp Suite ↑ 100%
Vulnerabilities
Buffer overflow ↑ 100%
Confused Deputy ↑ 100%
Cross-prompt Injection ↑ 100%
Inappropriate implementation in V8 ↑ 100%
Indirect Prompt Injection − 0%
We use cookies for analytics to improve your experience.