Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Vulnerabilities

  • Home
  • Vulnerabilities
  • Page 3
From Cybersecurity Help – Akira ransomware group exploiting SonicWall devices via year-old flaw
Posted inVulnerabilities

From Cybersecurity Help – Akira ransomware group exploiting SonicWall devices via year-old flaw

The attacks are leveraging CVE-2024-40766, an improper access control issue affecting SonicWall firewalls.  ​ Read More  ​ 
Posted by Samir K September 11, 2025
From Cybersecurity Help – Gonepostal malware that targets Microsoft Outlook linked to Russian Fancy Bear hackers
Posted inVulnerabilities

From Cybersecurity Help – Gonepostal malware that targets Microsoft Outlook linked to Russian Fancy Bear hackers

Gonepostal enables email-based C2 communication, effectively turning the email client into a backdoor.  ​ Read More  ​ 
Posted by Samir K September 10, 2025
From Cybersecurity Help – Kosovar national pleads guilty to operating BlackDB cybercrime marketplace
Posted inVulnerabilities

From Cybersecurity Help – Kosovar national pleads guilty to operating BlackDB cybercrime marketplace

Liridon Masurica faces a maximum sentence of 10 years in a US prison.  ​ Read More  ​ 
Posted by Samir K September 10, 2025
From Cybersecurity Help – Microsoft’s September 2025 Patch Tuesday fixes over 80 flaws, including two publicly disclosed
Posted inVulnerabilities

From Cybersecurity Help – Microsoft’s September 2025 Patch Tuesday fixes over 80 flaws, including two publicly disclosed

One of the previously disclosed flaws resides in Windows SMB Server and another affects the Newtonsoft.Json library.  ​ Read More  ​ 
Posted by Samir K September 10, 2025
From Cybersecurity Help – LockerGoga, MegaCortex, and Nefilim ransomware admin charged in the US
Posted inVulnerabilities

From Cybersecurity Help – LockerGoga, MegaCortex, and Nefilim ransomware admin charged in the US

Volodymyr Tymoshchuk is alleged to have been involved in compromising over 250 networks in the US, as well as hundreds more globally.  ​ Read More  ​ 
Posted by Samir K September 10, 2025
From Cybersecurity Help – New cryptojacking campaign abuses TOR network and exposed Docker APIs
Posted inVulnerabilities

From Cybersecurity Help – New cryptojacking campaign abuses TOR network and exposed Docker APIs

The attackers use the TOR network for anonymity and exploit misconfigured Docker instances to install XMRig.  ​ Read More  ​ 
Posted by Samir K September 9, 2025
From Cybersecurity Help – New threat actor TAG-150 linked to advanced malware infrastructure
Posted inVulnerabilities

From Cybersecurity Help – New threat actor TAG-150 linked to advanced malware infrastructure

TAG-150 maintains a large and complex infrastructure, including both victim-facing servers used to control various malware and multi-layered backend servers.  ​ Read More  ​ 
Posted by Samir K September 9, 2025
From Cybersecurity Help – Hidden Chinese APT infrastructure tied to Salt Typhoon and UNC4841
Posted inVulnerabilities

From Cybersecurity Help – Hidden Chinese APT infrastructure tied to Salt Typhoon and UNC4841

The domains are believed to be part of a long-running campaign to gain long-term access to global organizations.  ​ Read More  ​ 
Posted by Samir K September 9, 2025
From Cybersecurity Help – Massive NPM supply chain attack impacts packages with over 2.6B  weekly downloads
Posted inVulnerabilities

From Cybersecurity Help – Massive NPM supply chain attack impacts packages with over 2.6B weekly downloads

The maintainer of widely used NPM packages, confirmed his account was hijacked following a sophisticated phishing attack.  ​ Read More  ​ 
Posted by Samir K September 9, 2025
From Cybersecurity Help – GPUGate malware delivery chain targets IT professionals in Western Europe
Posted inVulnerabilities

From Cybersecurity Help – GPUGate malware delivery chain targets IT professionals in Western Europe

The threat actors behind GPUGate used malvertising to display fake ads at the top of Google search results.  ​ Read More  ​ 
Posted by Samir K September 8, 2025
From Cybersecurity Help – Massive GitHub supply chain attack exposes over 3,300 secrets across 800+ repos
Posted inVulnerabilities

From Cybersecurity Help – Massive GitHub supply chain attack exposes over 3,300 secrets across 800+ repos

The attack saw 327 GitHub accounts compromised, with malicious GitHub Actions workflows injected into 817 repositories.  ​ Read More  ​ 
Posted by Samir K September 8, 2025
From Cybersecurity Help – SAP S/4HANA code injection flaw actively exploited in the wild
Posted inVulnerabilities

From Cybersecurity Help – SAP S/4HANA code injection flaw actively exploited in the wild

Successful exploitation gives the attacker the ability to act with administrative privileges in the SAP system.  ​ Read More  ​ 
Posted by Samir K September 8, 2025
From Cybersecurity Help – Hackers compromised Drift platform via Salesloft GitHub account
Posted inVulnerabilities

From Cybersecurity Help – Hackers compromised Drift platform via Salesloft GitHub account

Using the account, the intruders downloaded content from multiple repositories and then added a guest user and established workflows.  ​ Read More  ​ 
Posted by Samir K September 8, 2025
From Cybersecurity Help – Cyber Security Week in Review: September 5, 2025
Posted inVulnerabilities

From Cybersecurity Help – Cyber Security Week in Review: September 5, 2025

In brief: WhatsApp fixes a flaw used in a spyware campaign, threat actors exploit a zero-day in Sitecore, and more.  ​ Read More  ​ 
Posted by Samir K September 5, 2025
From Cybersecurity Help – Hackers exploit exposed machine key in old Sitecore versions for RCE
Posted inVulnerabilities

From Cybersecurity Help – Hackers exploit exposed machine key in old Sitecore versions for RCE

The attackers are abusing a sample machine key that was included in Sitecore deployment guides from 2017 and earlier.  ​ Read More  ​ 
Posted by Samir K September 4, 2025

Posts pagination

Previous page 1 2 3 4 5 … 83 Next page

Latest Posts

  • From Dark Reading – Chinese APT Drops ‘Brickstorm’ Backdoors on Edge DevicesSeptember 26, 2025
  • From Cyber Security News – Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human RiskSeptember 25, 2025
  • From The Hacker News – Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation DirectiveSeptember 25, 2025
  • From The Hacker News – Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud NetworkSeptember 25, 2025
  • From Cyber Security News – Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive DataSeptember 25, 2025
Total Visitors
0575810

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2025 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top