Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader

North Korean threat actors involved in the Contagious Interview operation have expanded their software supply chain attacks by deploying a new malware loader named XORIndex in the npm ecosystem, alongside the ongoing HexEval Loader campaign. These loaders deliver multi-stage malware including BeaverTail and InvisibleFerret backdoors, targeting developers and cryptocurrency holders with sophisticated obfuscation and data exfiltration techniques. #XORIndex #HexEvalLoader #ContagiousInterview #BeaverTail #InvisibleFerret

Read More
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates

GLOBAL GROUP is a newly observed ransomware-as-a-service (RaaS) operation, likely a rebranding of the Black Lock RaaS, targeting multiple sectors across the US, Europe, Australia, and Brazil with advanced malware and AI-powered ransom negotiations. The group relies heavily on Initial Access Brokers to gain network entry and deploy ransomware rapidly, emphasizing high-value targets and seven-figure ransom demands. #GLOBALGROUP #BlackLock #Mamona #Ramp4u #InitialAccessBroker

Read More
Cybersecurity News | Daily Recap [11 Jul 2025]

Recent cybersecurity developments include arrests linked to the Scattered Spider and DragonForce ransomware groups, highlighting significant retail sector impacts and thwarted ransomware attempts. Notable vulnerabilities such as Wing FTP Server CVE-2025-47812 and Citrix NetScaler CVE-2025-5777 continue to be exploited, emphasizing the need for urgent updates. #ScatteredSpider #DragonForce #WingFTP #CVE2025-47812 #CVE2025-5777

Read More
In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs

This week’s cybersecurity news highlights new vulnerabilities in AMD processors, espionage activities by North Korean hackers, and exposed secrets in Docker images. The reports also cover rising cybersecurity investments, evolving malware threats like ZuRu, and attacks targeting government entities in Southern Europe. #AMDVulnerabilities #NorthKoreaHacking #DockerSecrets…

Read More
Finding Fake/Phishing Domains with HTML Features in Validin

Validin provides extensive HTTP/S response data that enables threat analysts to discover related malicious domains and infrastructure by pivoting on features like favicon hashes, HTTP redirects, and HTML content. The platform helps identify phishing campaigns, malicious browser extension C2 domains, and fake app download sites through detailed feature correlation and exploration. #Validin #ClickFix #MaliciousExtensions #PhishingDomains

Read More
CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems

CVE-2025-48384 is a critical vulnerability in Git CLI versions 2.50.0 and earlier that allows arbitrary file write and remote code execution via malicious repositories using the –recursive clone option. The GitHub Desktop client for macOS is also vulnerable, and no patch is currently available for it, making users advised to switch to patched Git CLI versions urgently. #CVE202548384 #GitCLI #GitHubDesktop

Read More
RENDERSHOCK: WEAPONIZING TRUST IN FILE RENDERING PIPELINES

RenderShock is a zero-click attack framework that exploits passive file preview, indexing, and automation in modern operating systems to execute malicious payloads without user interaction. It leverages trusted system features to perform reconnaissance, credential theft, remote code execution, and persistence, posing significant stealth and detection challenges. #RenderShock #NTLMLeak #RemoteTemplateInjection

Read More
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

Cybercriminals are actively targeting cryptocurrency users with social engineering campaigns that impersonate AI, gaming, and Web3 companies through fake social media accounts and legitimate platforms. The effort involves malware delivery via fake startup websites, aiming to steal digital assets on Windows and macOS systems. #Realst #AtomicStealer…

Read More
Cybersecurity News | Daily Recap [11 Jul 2025]

Cybersecurity experts report a surge in sophisticated spyware campaigns, including the Batavia and Atomic Stealer strains, targeting Russian firms and Mac users globally. Additionally, new botnets like RondoDox and hpingbot are exploiting vulnerabilities and enabling stealthy DDoS attacks, highlighting persistent threats to organizations worldwide. #Batavia #AtomicStealer #RondoDox #hpingbot

Read More
Cybersecurity News | Daily Recap [11 Jul 2025]

This cybersecurity recap highlights the abuse of legitimate tools like Inno Setup and Shellter Elite by cybercriminals to distribute stealthy malware and evade detection. It also reports on sophisticated nation-state espionage campaigns by North Korea, TAG-140, APT36, and NightEagle, targeting critical sectors across different regions. #InnoSetupAbuse #ShellterElite #NimDoor #TAG-140 #APT36 #NightEagle

Read More