Russian hackers exploit Windows flaw to spread malware via fake IT messages
The treat actors have been sending Microsoft Teams requests to victims posing as IT staff.
The treat actors have been sending Microsoft Teams requests to victims posing as IT staff.
In brief: Russia-linked Turla targets foreign embassies in Moscow, a critical SAP NetWeaver flaw exploited to deploy the Auto-Color backdoor, and more.
The latest campaign leverages a previously unreported method of initial access, combining multiple tactics.
The JSCEAL campaign leverages malvertising primarily on social media platforms.
The patents mention tools for encrypted endpoint data collection, forensic access to Apple devices, and remote control of routers and smart home systems.
The joint advisory was updated with the latest data from FBI-led investigations as recent as June 2025.
The attack exploited the CVE-2025-31324 vulnerability that allows attackers to upload arbitrary files.
Researchers discovered that Leak Zone left an unsecured Elasticsearch database exposed to the internet.
The malicious packages contained payloads capable of exfiltrating GitHub authentication tokens and destroying victim systems.
Scans from affected users identified the malware as part of the XRed backdoor family.
Showing elements 461 - 470