Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Vulnerabilities

  • Home
  • Vulnerabilities
  • Page 6
From Cybersecurity Help – Years-long Russian cyberespionage campaign targets Western critical infrastructure
Posted inVulnerabilities

From Cybersecurity Help – Years-long Russian cyberespionage campaign targets Western critical infrastructure

The activity has been observed between 2021 and 2025 and has been attributed “with high confidence” to Russia’s GRU.  ​ Read More  ​ 
Posted by Samir K December 16, 2025
From Cybersecurity Help – Phishing campaign targets Russian organizations with Phantom Stealer
Posted inVulnerabilities

From Cybersecurity Help – Phishing campaign targets Russian organizations with Phantom Stealer

Phantom Stealer is capable of harvesting sensitive data from cryptocurrency wallets, browsers, and desktop apps.  ​ Read More  ​ 
Posted by Samir K December 15, 2025
From Cybersecurity Help – At least five Chinese APTs exploiting React2Shell flaw for initial access
Posted inVulnerabilities

From Cybersecurity Help – At least five Chinese APTs exploiting React2Shell flaw for initial access

GTIG also observed multiple incidents, in which threat actors exploited CVE-2025-55182 to deploy XMRig.  ​ Read More  ​ 
Posted by Samir K December 15, 2025
From Cybersecurity Help – Flawed ransomware from pro-Russia hacktivists lets victims decrypt files for free
Posted inVulnerabilities

From Cybersecurity Help – Flawed ransomware from pro-Russia hacktivists lets victims decrypt files for free

VolkLocker’s encryptor relies on a hardcoded master key embedded directly in the malware binary.  ​ Read More  ​ 
Posted by Samir K December 15, 2025
From Cybersecurity Help – Apple fixes two WebKit flaws actively exploited in the wild
Posted inVulnerabilities

From Cybersecurity Help – Apple fixes two WebKit flaws actively exploited in the wild

One of the flaws is the same issue Google addressed last week in its Chrome browser.  ​ Read More  ​ 
Posted by Samir K December 15, 2025
From Cybersecurity Help – Cyber Security Week in Review: December 12, 2025
Posted inVulnerabilities

From Cybersecurity Help – Cyber Security Week in Review: December 12, 2025

In brief: Hackers are increasingly exploit the React2Shell flaw, Google, Microsoft and others patch zero-days in their products, and more.  ​ Read More  ​ 
Posted by Samir K December 12, 2025
From Cybersecurity Help – Google addresses eighth Chrome zero-day of the year
Posted inVulnerabilities

From Cybersecurity Help – Google addresses eighth Chrome zero-day of the year

Google withheld technical details, including the CVE identifier, saying coordination is still underway.  ​ Read More  ​ 
Posted by Samir K December 11, 2025
From Cybersecurity Help – Hacker linked to Russian-backed CARR and Noname(16) groups charged in the US
Posted inVulnerabilities

From Cybersecurity Help – Hacker linked to Russian-backed CARR and Noname(16) groups charged in the US

Victoria Dubranova, aka “Vika,” “Tory,” and “SovaSonya,” was extradited to the United States earlier this year.  ​ Read More  ​ 
Posted by Samir K December 11, 2025
From Cybersecurity Help – North Korean hackers deploy new EtherRAT malware in React2Shell attacks
Posted inVulnerabilities

From Cybersecurity Help – North Korean hackers deploy new EtherRAT malware in React2Shell attacks

The implant comes with sophisticated mix of features, including blockchain-based C2, multi-layered persistence, and a full Node.js runtime for evasion.  ​ Read More  ​ 
Posted by Samir K December 10, 2025
From Cybersecurity Help – Fortinet, Ivanti patch critical authentication and code-execution flaws
Posted inVulnerabilities

From Cybersecurity Help – Fortinet, Ivanti patch critical authentication and code-execution flaws

Organizations are recommended to apply fixes as soon as possible.  ​ Read More  ​ 
Posted by Samir K December 10, 2025
From Cybersecurity Help – Microsoft fixes over 50 flaws, including actively exploited zero-day
Posted inVulnerabilities

From Cybersecurity Help – Microsoft fixes over 50 flaws, including actively exploited zero-day

Microsoft has not disclosed details about how the flaw was used in the wild.  ​ Read More  ​ 
Posted by Samir K December 10, 2025
From Cybersecurity Help – New JS#SMUGGLER campaign uses breached websites to deploy NetSupport RAT
Posted inVulnerabilities

From Cybersecurity Help – New JS#SMUGGLER campaign uses breached websites to deploy NetSupport RAT

The RAT grants attackers extensive access to infected systems.  ​ Read More  ​ 
Posted by Samir K December 9, 2025
From Cybersecurity Help – Ransomware gangs adopt new Shanya PaaS to evade EDR tools
Posted inVulnerabilities

From Cybersecurity Help – Ransomware gangs adopt new Shanya PaaS to evade EDR tools

Shanya provides threat actors with a way to wrap their malware in highly customized, obfuscated code that bypasses most security tools.  ​ Read More  ​ 
Posted by Samir K December 9, 2025
From Cybersecurity Help – Two malicious VS Code extensions steal credentials, cookies, and crypto wallets
Posted inVulnerabilities

From Cybersecurity Help – Two malicious VS Code extensions steal credentials, cookies, and crypto wallets

The extensions called “Bitcoin Black” and “Codo AI” were disguised as a color theme and AI assistant.  ​ Read More  ​ 
Posted by Samir K December 9, 2025
From Cybersecurity Help – New agentic browser attack lets emails trigger Google Drive wipe
Posted inVulnerabilities

From Cybersecurity Help – New agentic browser attack lets emails trigger Google Drive wipe

Because the agent interprets the message as legitimate workload, it may execute the destructive steps without prompting the user for approval.  ​ Read More  ​ 
Posted by Samir K December 8, 2025

Posts pagination

Previous page 1 … 4 5 6 7 8 … 98 Next page

Latest Posts

  • From Cyber Security News – Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager CredentialsMay 8, 2026
  • From Graham Cluley – One in eight UK workers has sold their company passwords, and bosses think it’s fineMay 8, 2026
  • From The Hacker News – Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store DownloadsMay 8, 2026
  • From Graham Cluley – Inside Department 4: Russia’s secret school for hackersMay 8, 2026
  • From Security Week – In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerMay 8, 2026
Total Visitors
1501526

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top