Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Vulnerabilities

  • Home
  • Vulnerabilities
  • Page 4
From Cybersecurity Help – Malicious Chrome extensions caught stealing ChatGPT and DeepSeek conversations
Posted inVulnerabilities

From Cybersecurity Help – Malicious Chrome extensions caught stealing ChatGPT and DeepSeek conversations

The malicious add-ons masquerade as legitimate AI sidebar tools.  ​ Read More  ​ 
Posted by Samir K January 7, 2026
From Cybersecurity Help – RCE flaw in legacy D-Link DSL gateway devices actively exploited in the wild
Posted inVulnerabilities

From Cybersecurity Help – RCE flaw in legacy D-Link DSL gateway devices actively exploited in the wild

The vulnerability enables unauthenticated RCE by allowing attackers to inject and run shell commands on exposed devices.  ​ Read More  ​ 
Posted by Samir K January 7, 2026
From Cybersecurity Help – Threat actor allegedly sells corporate data linked to cloud file-sharing breaches
Posted inVulnerabilities

From Cybersecurity Help – Threat actor allegedly sells corporate data linked to cloud file-sharing breaches

Hudson Rock says initial access was likely obtained using credentials harvested by infostealers like RedLine, Lumma, and Vidar.  ​ Read More  ​ 
Posted by Samir K January 6, 2026
From Cybersecurity Help – Russian hackers target European hospitality industry with fake BSoD malware
Posted inVulnerabilities

From Cybersecurity Help – Russian hackers target European hospitality industry with fake BSoD malware

The campaign, dubbed ‘PHALT#BLYX,’ begins with phishing emails posing as reservation cancellations from popular hotel booking platforms.  ​ Read More  ​ 
Posted by Samir K January 6, 2026
From Cybersecurity Help – Kimwolf Android botnet infects over 2M devices via residential proxies
Posted inVulnerabilities

From Cybersecurity Help – Kimwolf Android botnet infects over 2M devices via residential proxies

Kimwolf is believed to be an Android variant of AISURU and may be behind a series of record-setting DDoS attacks late last year.  ​ Read More  ​ 
Posted by Samir K January 6, 2026
From Cybersecurity Help – Russia-linked hackers target Ukraine via Viber malware campaign
Posted inVulnerabilities

From Cybersecurity Help – Russia-linked hackers target Ukraine via Viber malware campaign

The group has maintained “high-intensity intelligence gathering activities” against Ukrainian institutions throughout 2025.  ​ Read More  ​ 
Posted by Samir K January 6, 2026
From Cybersecurity Help – Trust Wallet links $8.5M browser extension hack to industry-wide Sha1-Hulud attack
Posted inVulnerabilities

From Cybersecurity Help – Trust Wallet links $8.5M browser extension hack to industry-wide Sha1-Hulud attack

The attackers gained access after Trust Wallet’s developer GitHub secrets were exposed.  ​ Read More  ​ 
Posted by Samir K January 5, 2026
From Cybersecurity Help – New APT37’s Artemis campaign using trojanized HWP documents
Posted inVulnerabilities

From Cybersecurity Help – New APT37’s Artemis campaign using trojanized HWP documents

The operation uses social engineering and technical evasion techniques, delivering malware through trojanized HWP documents.  ​ Read More  ​ 
Posted by Samir K January 5, 2026
From Cybersecurity Help – DarkSpectre browser extension campaigns compromise over 8.8M users worldwide
Posted inVulnerabilities

From Cybersecurity Help – DarkSpectre browser extension campaigns compromise over 8.8M users worldwide

The latest campaign alone impacted 2.2 million users through malicious browser extensions distributed across the three major browsers.  ​ Read More  ​ 
Posted by Samir K January 5, 2026
From Cybersecurity Help – Two cybersecurity experts plead guilty for ALPHV BlackCat ransomware attacks
Posted inVulnerabilities

From Cybersecurity Help – Two cybersecurity experts plead guilty for ALPHV BlackCat ransomware attacks

Goldberg worked at incident response firm Sygnia, while Martin, served as a ransomware negotiator for financial technology company DigitalMint.  ​ Read More  ​ 
Posted by Samir K January 5, 2026
From Cybersecurity Help – Recently disclosed MongoBleed vulnerability under active exploitation worldwide
Posted inVulnerabilities

From Cybersecurity Help – Recently disclosed MongoBleed vulnerability under active exploitation worldwide

ensys and the Shadowserver Foundation identified roughly 87,000 and 74,854 potentially exposed systems worldwide, respectively.  ​ Read More  ​ 
Posted by Samir K December 30, 2025
From Cybersecurity Help – Cyber Security Week in Review: December 26, 2025
Posted inVulnerabilities

From Cybersecurity Help – Cyber Security Week in Review: December 26, 2025

In brief: Fortinet warns of a five-year-old FortiOS flaw exploited in the wild, Russian defense-industry orgs targeted in a new campaign, and more.  ​ Read More  ​ 
Posted by Samir K December 26, 2025
From Cybersecurity Help – US seizes fraud domain, charges operator of fake ID marketplaces
Posted inVulnerabilities

From Cybersecurity Help – US seizes fraud domain, charges operator of fake ID marketplaces

The seized domain served as a backend control panel that stored and managed illegally harvested bank login credentials.  ​ Read More  ​ 
Posted by Samir K December 23, 2025
From Cybersecurity Help – Malicious Phantom Shuttle Chrome extensions hijack user traffic
Posted inVulnerabilities

From Cybersecurity Help – Malicious Phantom Shuttle Chrome extensions hijack user traffic

The extensions route all web traffic through attacker-controlled proxy servers using hardcoded credentials hidden with a custom encoding scheme.  ​ Read More  ​ 
Posted by Samir K December 23, 2025
From Cybersecurity Help – Goffee cyberspies target Russian military personnel and defense-industry orgs
Posted inVulnerabilities

From Cybersecurity Help – Goffee cyberspies target Russian military personnel and defense-industry orgs

The group is experimenting with new techniques to evade detection but still shows gaps in technical execution and language accuracy.  ​ Read More  ​ 
Posted by Samir K December 23, 2025

Posts pagination

Previous page 1 2 3 4 5 6 … 98 Next page

Latest Posts

  • From Security Week – Vendor Says Daemon Tools Supply Chain Attack ContainedMay 7, 2026
  • From Cyber Security News – Hackers Using Fake Claude AI Installer Pages to Trick Users Into Running Malware on Their SystemsMay 7, 2026
  • From Dark Reading – ‘TrustFall’ Exposes Claude Code Execution RiskMay 7, 2026
  • From Dark Reading – World’s First AI-Driven Cyberattack Couldn’t Breach OT SystemsMay 7, 2026
  • From Security Week – AI Coding Agents Could Fuel Next Supply Chain CrisisMay 7, 2026
Total Visitors
1494294

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top