Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Vulnerabilities

  • Home
  • Vulnerabilities
  • Page 5
From Cybersecurity Help – Interpol-led op arrests over 500 suspects linked to BEC, ransomware, and extortion
Posted inVulnerabilities

From Cybersecurity Help – Interpol-led op arrests over 500 suspects linked to BEC, ransomware, and extortion

As part of Operation Sentinel, more than 6,000 malicious links were taken down and the six ransomware variants were decrypted.  ​ Read More  ​ 
Posted by Samir K December 23, 2025
From Cybersecurity Help – Romania confirms major ransomware attack on national water administration
Posted inVulnerabilities

From Cybersecurity Help – Romania confirms major ransomware attack on national water administration

The attackers used the built-in Windows BitLocker security feature to lock files on compromised systems.  ​ Read More  ​ 
Posted by Samir K December 22, 2025
From Cybersecurity Help – Nigerian police arrest three in Raccoon0365 Microsoft 365 phishing case
Posted inVulnerabilities

From Cybersecurity Help – Nigerian police arrest three in Raccoon0365 Microsoft 365 phishing case

Raccoon0365 was responsible for at least 5,000 compromised Microsoft 365 accounts across 94 countries.  ​ Read More  ​ 
Posted by Samir K December 22, 2025
From Cybersecurity Help – Phishing attacks abuse Microsoft 365 device code login to bypass MFA
Posted inVulnerabilities

From Cybersecurity Help – Phishing attacks abuse Microsoft 365 device code login to bypass MFA

The attacks involve both financially motivated cybercriminal groups, such as TA2723, and state-backed threat actors.  ​ Read More  ​ 
Posted by Samir K December 22, 2025
From Cybersecurity Help – Nefilim ransomware affiliate pleads guilty, faces up to 10 years in prison
Posted inVulnerabilities

From Cybersecurity Help – Nefilim ransomware affiliate pleads guilty, faces up to 10 years in prison

Stryzhak gained access to the Nefilim ransomware platform in June 2021 in exchange for 20 percent of any ransom proceeds.  ​ Read More  ​ 
Posted by Samir K December 22, 2025
From Cybersecurity Help – Cyber Security Week in Review: December 19, 2025
Posted inVulnerabilities

From Cybersecurity Help – Cyber Security Week in Review: December 19, 2025

In brief: SonicWall, Sisco, WatchGuard patch actively exploited zero-days, the Clop extortion group targets CentreStack file servers, and more.  ​ Read More  ​ 
Posted by Samir K December 19, 2025
From Cybersecurity Help – French intelligence investigate suspected foreign spyware operation on ferry
Posted inVulnerabilities

From Cybersecurity Help – French intelligence investigate suspected foreign spyware operation on ferry

The probe was launched after French authorities received intelligence from Italy indicating that the ferry’s IT system had been infected with a RAT.  ​ Read More  ​ 
Posted by Samir K December 18, 2025
From Cybersecurity Help – SonicWall and Cisco warn of zero-day attacks targeting network security appliances
Posted inVulnerabilities

From Cybersecurity Help – SonicWall and Cisco warn of zero-day attacks targeting network security appliances

Attacks involving Cisco SEG and SEWM appliances have been attributed to a suspected Chinese threat group known as UAT-9686.  ​ Read More  ​ 
Posted by Samir K December 18, 2025
From Cybersecurity Help – GhostPoster campaign hides malware in Firefox extension logos
Posted inVulnerabilities

From Cybersecurity Help – GhostPoster campaign hides malware in Firefox extension logos

The campaign involves at least 17 compromised Firefox extensions that use steganography to conceal a JavaScript loader within PNG logo files.  ​ Read More  ​ 
Posted by Samir K December 17, 2025
From Cybersecurity Help – A major fraud operation dismantled in Ukraine
Posted inVulnerabilities

From Cybersecurity Help – A major fraud operation dismantled in Ukraine

Scammers allegedly tricked victims into installing remote access software, allowing criminals to steal online banking credentials.  ​ Read More  ​ 
Posted by Samir K December 17, 2025
From Cybersecurity Help – Urban VPN Proxy extension reportedly found harvesting AI chat conversations
Posted inVulnerabilities

From Cybersecurity Help – Urban VPN Proxy extension reportedly found harvesting AI chat conversations

The extension includes scripts designed to capture conversations across major platforms such as ChatGPT, Claude,  and Gemini.  ​ Read More  ​ 
Posted by Samir K December 17, 2025
From Cybersecurity Help – Chinese Ink Dragon hackers set their sights on Europe, exploit IIS and SharePoint flaws
Posted inVulnerabilities

From Cybersecurity Help – Chinese Ink Dragon hackers set their sights on Europe, exploit IIS and SharePoint flaws

The attack starts with the attackers gaining initial access via ViewState deserialization or ToolShell-based exploits, then deploy ShadowPad on the compromised server.  ​ Read More  ​ 
Posted by Samir K December 17, 2025
From Cybersecurity Help – New BlackForce phishing kit uses advanced MFA bypass
Posted inVulnerabilities

From Cybersecurity Help – New BlackForce phishing kit uses advanced MFA bypass

BlackForce is designed to steal user credentials and conduct Man-in-the-Browser (MitB) attacks.  ​ Read More  ​ 
Posted by Samir K December 16, 2025
From Cybersecurity Help – React2Shell flaw exploited to deploy KSwapDoor and ZnDoor backdoors
Posted inVulnerabilities

From Cybersecurity Help – React2Shell flaw exploited to deploy KSwapDoor and ZnDoor backdoors

Attackers are abusing the flaw to achieve remote code execution in applications using React Server Components.  ​ Read More  ​ 
Posted by Samir K December 16, 2025
From Cybersecurity Help – Critical FortiGate flaws come under active exploitation
Posted inVulnerabilities

From Cybersecurity Help – Critical FortiGate flaws come under active exploitation

Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on December 12.  ​ Read More  ​ 
Posted by Samir K December 16, 2025

Posts pagination

Previous page 1 … 3 4 5 6 7 … 98 Next page

Latest Posts

  • From Security Week – Vendor Says Daemon Tools Supply Chain Attack ContainedMay 7, 2026
  • From Cyber Security News – Hackers Using Fake Claude AI Installer Pages to Trick Users Into Running Malware on Their SystemsMay 7, 2026
  • From Dark Reading – ‘TrustFall’ Exposes Claude Code Execution RiskMay 7, 2026
  • From Dark Reading – World’s First AI-Driven Cyberattack Couldn’t Breach OT SystemsMay 7, 2026
  • From Security Week – AI Coding Agents Could Fuel Next Supply Chain CrisisMay 7, 2026
Total Visitors
1494294

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top