ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 56

Threat Score:
52
Security Affairs
2 days ago
Part of cluster #1565

Overview

Security Affairs Malware includes a collection of the best articles and research on malware in the international landscape Malware Endgame Gear mouse config tool infected users with malware Auto-Color Backdoor: How Darktrace Thwarted a Stealthy Linux Intrusion  Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal Decrypted: FunkSec Ransomware  Threat actor uses […]...

Continue Reading on Original Site

Related Articles

5 articles
1

2025-08-06 - Cluster AI Daily Threat Brief

ThreatCluster • 6 hours ago

# Daily Threat Intelligence Brief: August 6, 2025 ## Executive Summary Today's threat landscape is markedly aggressive, dominated by critical ransomware attacks and zero-day vulnerabilities that pose substantial risks to organizations across various sectors, particularly healthcare and technology. The recent **DaVita ransomware attack**, affecting over **1 million patients**, underscores the urgency for healthcare providers to bolster their defenses against ransomware and phishing tactics empl

Score
95
Read more
2

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Cybersecurity News • 4 hours ago

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog. The inclusion of these flaws in the catalog signifies that they are being actively exploited by malicious cyber actors in real-world attacks, posing a significant threat to networks. The […]

Score
87
Read more
3

SonicWall firewalls hit by active mass exploitation of suspected zero-day

CyberScoop • 7 hours ago

20 organizations have been impacted and the pace of attacks is rising. Threat researchers and SonicWall are scrambling to determine the root cause.

Score
86
Read more
4
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 15 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
5
Risky Bulletin: Russia's war on foreign software continues

Risky Bulletin: Russia's war on foreign software continues

Risky • 5 hours ago

Brought to you bytines The smart, secure workflow builder Show notes Risky Bulletin: Russia to designate ERPs as "critical information infrastructure"

Score
83
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

ATTACK TYPES
Adversary-in-the-Middle
Credential Harvesting
Data Exfiltration
Malware Deployment
Ransomware
SECURITY VENDORS
Darktrace
PLATFORMS
Linux
APT GROUPS
FunkSec
Secret Blizzard
Turla
RANSOMWARE
funksec
MITRE ATT&CK
T1021
T1027
T1059
T1060
T1070
MALWARE
ApolloShadow
Auto-Color
Plague
COMPANIES
Aeroflot
Darktrace
FBI
Microsoft
COUNTRIES
China
Russia
Ukraine
INDUSTRIES
Aviation
Cybersecurity
Diplomatic Services
Government
Telecommunications
AGENCIES
FBI
VULNERABILITIES
Authentication Bypass
ARTICLE INFORMATION
Article #8135
Published 2 days ago
Security Affairs

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration