CrowdCyber
npub1xm6q...7acu
Revolutionizing and Democratizing Cybersecurity
Dormant Iran APT is Still Alive, Spying on Dissidents


Dark Reading
Dormant Iran APT is Still Alive, Spying on Dissidents
"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication with its C2 server.
Rust’s First Breach: CVE-2025-68260 Marks the First Rust Vulnerability in the Linux Kernel


Daily CyberSecurity
Rust’s First Breach: CVE-2025-68260 Marks the First Rust Vulnerability in the Linux Kernel
Linux logs its first Rust CVE (CVE-2025-68260): a race condition in the Android Binder driver causing kernel crashes. Fixed in 6.18.1 and 6.19-rc1.
Clop ransomware targets Gladinet CentreStack in data theft attacks


BleepingComputer
Clop ransomware targets Gladinet CentreStack in data theft attacks
The Clop ransomware gang is targeting Internet-exposed Gladinet CentreStack file servers in a new data theft extortion campaign.
Synthetic Identities: A Dual Threat to Enterprises


Synthetic Identities: A Dual Threat to Enterprises
Learn more about how synthetic identities and AI-powered deepfakes enable fraud, sanctions evasion, and insider threats—and how enterprises can d...
CVE-2025-46295 (CVSS 9.8): Critical Apache Commons Text Flaw Risks Total Server Takeover


Daily CyberSecurity
CVE-2025-46295 (CVSS 9.8): Critical Apache Commons Text Flaw Risks Total Server Takeover
A critical RCE flaw (CVSS 9.8) in Apache Commons Text mirrors Log4Shell, allowing server takeover. FileMaker Server users must update to v22.0.4 now.
Sonicwall warns of new SMA1000 zero-day exploited in attacks


BleepingComputer
Sonicwall warns of new SMA1000 zero-day exploited in attacks
SonicWall warned customers today to patch a vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was chained in zero-day ...
Critical React2Shell flaw exploited in ransomware attacks


BleepingComputer
Critical React2Shell flaw exploited in ransomware attacks
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deployed the f...
Cisco warns of unpatched AsyncOS zero-day exploited in attacks


BleepingComputer
Cisco warns of unpatched AsyncOS zero-day exploited in attacks
Cisco warned customers today of an unpatched, maximum-severity Cisco AsyncOS zero-day actively exploited in attacks targeting Secure Email Gatew...
WhatsApp device linking abused in account hijacking attacks


BleepingComputer
WhatsApp device linking abused in account hijacking attacks
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
Amazon: Ongoing cryptomining campaign uses hacked AWS accounts


BleepingComputer
Amazon: Ongoing cryptomining campaign uses hacked AWS accounts
Amazon's AWS GuardDuty security team is warning of an ongoing crypto-mining campaign that targets its Elastic Compute Cloud (EC2) and Elastic ...
RTO Challan Scam: How a Fake Traffic Ticket and a Malicious VPN Can Drain Your Bank Account


Daily CyberSecurity
RTO Challan Scam: How a Fake Traffic Ticket and a Malicious VPN Can Drain Your Bank Account
RTO Challan malware hijacks Android devices in India using a fake traffic ticket lure, a malicious VPN, and SMS interception to steal UPI PINs and ...
Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media


Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media
Uncover how Russia’s CopyCop network uses AI-generated news and fake media sites to influence global audiences—and learn the key defenses again...
Ink Dragon’s Global Mesh: How Chinese Spies Turn Compromised Government Servers into C2 Relay Nodes


Daily CyberSecurity
Ink Dragon’s Global Mesh: How Chinese Spies Turn Compromised Government Servers into C2 Relay Nodes
Ink Dragon is weaponizing government servers in Europe using a relay-centric mesh. By hijacking IIS servers, they mask C2 traffic across global net...
Attackers Use Stolen AWS Credentials in Cryptomining Campaign


Dark Reading
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple custom...
How Ransomware Affects Business Operations, Revenue, and Brand Reputation


How Ransomware Affects Business Operations, Revenue, and Brand Reputation
Learn how ransomware works, how it can impact operations, revenue, and brand reputation, and how to prevent ransomware from infecting your business.
Two Chrome flaws could be triggered by simply browsing the web: Update now


Malwarebytes
Two Chrome flaws could be triggered by simply browsing the web: Update now
Google pushed out a patch for two more security vulnerabilities in the Chrome browser. Update now!
GhostPoster attacks hide malicious JavaScript in Firefox addon logos


BleepingComputer
GhostPoster attacks hide malicious JavaScript in Firefox addon logos
A new campaign dubbed 'GhostPoster' is hiding JavaScript code in the image logo of malicious Firefox extensions counting more than 50,000...


