In today’s hyper-connected world, telecommunications providers are vital cogs in global communication networks. Their role in facilitating voice calls, data transfers, and internet connectivity makes them prime targets for cyber espionage. Recently, a major Asian telecom provider learned this the hard way when a sophisticated group of Chinese hackers successfully …
VanHelsing RaaS: A New Multi-OS Ransomware Threat
Ransomware-as-a-Service (RaaS) has become a dominant force in the cybercriminal underground, enabling even those with limited technical expertise to launch devastating cyberattacks. The latest entrant in this growing market is VanHelsing RaaS, a new ransomware operation that has quickly gained traction due to its aggressive tactics, cross-platform capabilities, and double …
Critical SQL Injection in Kortex Lite: Analysis & Mitigation
In the realm of web security, SQL Injection (SQLi) is one of the most dangerous vulnerabilities that can compromise the confidentiality, integrity, and availability of an application. Recently, a critical SQL injection vulnerability was discovered in SourceCodester Kortex Lite Advocate Office Management System 1.0, specifically in the edit_case.php file. This …
Medusa Ransomware: The Silent Cyber War
Ransomware attacks have become one of the most persistent cybersecurity threats in recent years, with cybercriminals increasingly targeting critical sectors such as healthcare, finance, energy, and government institutions. Among the most notorious strains is Medusa ransomware, a rapidly evolving cyber threat that has been causing widespread disruption since its emergence …
Qilin Gang Allegedly Hacks Ukraine’s Foreign Ministry
Cybersecurity researchers have reported that the Qilin ransomware gang has claimed responsibility for hacking the Ministry of Foreign Affairs of Ukraine. This alleged breach underscores the persistent threat posed by ransomware groups to governmental institutions and raises concerns over national security, data privacy, and geopolitical stability. Cyberattacks against government entities …
YouTubers Exploited to Spread SilentCryptoMiner on Windows
Cybercriminals are constantly evolving their tactics to distribute malware, and YouTube has become a new battleground for their schemes. Recently, security researchers have uncovered a campaign where attackers are exploiting YouTubers to spread a stealthy malware known as SilentCryptoMiner, which covertly mines cryptocurrency on Windows systems without user consent. This …
Chinese Hackers Indicted: U.S. Unveils Massive Cybercrime
The U.S. Department of Justice has charged twelve Chinese nationals, including hackers and government officials, for their involvement in cybercrime campaigns. These targeted dissidents, news organizations, U.S. agencies, and universities. The indictment highlights rising tensions in global cybersecurity. State-sponsored hacking remains a major threat to national security and businesses worldwide. …
The Zorlan SkyCaiji 2.9 Vulnerability(CVE-2025-1799)
A critical vulnerability has been found in Zorlan SkyCaiji 2.9. This issue affects the previewAction function in the file vendor/skycaiji/app/admin/controller/Tool.php. The vulnerability allows server-side request forgery (SSRF), which can be exploited remotely. An SSRF vulnerability lets attackers make unauthorized requests from the server. This can lead to data leaks, system …
The Blizzard Battle.net Vulnerability(CVE-2025-1804)
Blizzard Battle.net, a popular online gaming platform, was found to have a critical vulnerability affecting versions up to 2.39.0.15212 on Windows. This vulnerability involves a flaw in the library profapi.dll, leading to an uncontrolled search path issue. While exploitation requires local access and is considered complex, the consequences of a …
Hackers Use Fake Mods and Cracks to Spread Malware!
A new malware campaign is targeting gamers and software users. Attackers are spreading malicious software disguised as game mods and software cracks. Once installed, these fake programs steal user data. This campaign highlights the risks of downloading files from untrusted sources. Gaming mods and software cracks are widely sought after …