Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

cyber threat intelligence

  • Home
  • cyber threat intelligence
  • Page 3
From Cybercrime Magazine – Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers
Posted inNews

From Cybercrime Magazine – Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 18, 2025 The Cybercrime Magazine YouTube channel exceeded 500,000 subscribers today, up from the 100,000 we reported in…
Posted by shaikh Saqib March 18, 2025
From Cyber Security News – Zoom Team Chat Decrypted to Uncover User Activities
Posted inNews

From Cyber Security News – Zoom Team Chat Decrypted to Uncover User Activities

 In a significant development for digital forensics investigators, new research has revealed comprehensive methods to decrypt Zoom Team Chat databases, potentially exposing sensitive user communications and activities.  As organizations worldwide…
Posted by shaikh Saqib March 17, 2025
From Dark Reading – Threat Actor Tied to LockBit Ransomware Targets Fortinet Users
Posted inNews

From Dark Reading – Threat Actor Tied to LockBit Ransomware Targets Fortinet Users

The Mora_001 group uses similar post-exploitation patterns and ransomware customization originated by LockBit. Read More  
Posted by shaikh Saqib March 14, 2025
From Security Week – Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks
Posted inNews

From Security Week – Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

[[{"value":"The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities in Fortinet firewalls. The post Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks appeared first on SecurityWeek."}]] Read More  
Posted by shaikh Saqib March 14, 2025
From Cyber Security News – SuperBlack Actors Exploiting Two Fortinet Vulnerabilities to Deploy Ransomware
Posted inNews

From Cyber Security News – SuperBlack Actors Exploiting Two Fortinet Vulnerabilities to Deploy Ransomware

 Between late January and early March 2025, cybersecurity researchers at Forescout’s Vedere Labs uncovered a series of sophisticated intrusions leveraging critical Fortinet vulnerabilities. The attacks, attributed to a newly identified…
Posted by shaikh Saqib March 14, 2025
From The Hacker News – Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails
Posted inNews

From The Hacker News – Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix to deliver credential-stealing malware. The activity, the tech giant said, started in December 2024 and operates with the end goal of conducting financial fraud and theft. It's
Posted by shaikh Saqib March 13, 2025
From Security Week – Microsoft Warns of Hospitality Sector Attacks Involving ClickFix
Posted inNews

From Security Week – Microsoft Warns of Hospitality Sector Attacks Involving ClickFix

[[{"value":"A cybercrime group named Storm-1865 has targeted hospitality organizations via fake Booking.com emails and the use of social engineering. The post Microsoft Warns of Hospitality Sector Attacks Involving ClickFix appeared…
Posted by shaikh Saqib March 13, 2025
From The Hacker News – GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks
Posted inNews

From The Hacker News – GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup language and open-standard used for exchanging authentication and authorization data between parties, enabling features like single sign-on (SSO), which allows
Posted by shaikh Saqib March 13, 2025
From Cybersecurity Help – New North Korea-linked Android spyware KoSpy targets Korean and English-speaking users
Posted inVulnerabilities

From Cybersecurity Help – New North Korea-linked Android spyware KoSpy targets Korean and English-speaking users

KoSpy is distributed through fake utility applications, which masquerade as helpful tools.  ​ Read More  ​ 
Posted by shaikh Saqib March 13, 2025
From Cybersecurity Help – Chinese hackers Volt Typhoon lurked for nearly a year in systems of US utility company
Posted inVulnerabilities

From Cybersecurity Help – Chinese hackers Volt Typhoon lurked for nearly a year in systems of US utility company

The breach is believed to be part of a broader cyberespionage effort by China’s government targeting US critical infrastructure.  ​ Read More  ​ 
Posted by shaikh Saqib March 13, 2025
From The Hacker News – Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
Posted inNews

From The Hacker News – Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning multiple platforms. "At least 400 IPs have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts," the company said, adding it observed the activity on March 9, 2025. The countries which
Posted by shaikh Saqib March 12, 2025
From Cyber Security News – New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
Posted inNews

From Cyber Security News – New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams

 A newly identified botnet, tracked as Eleven11bot, has compromised approximately 30,000 internet-connected devices—primarily security cameras and network video recorders (NVRs)—to launch distributed denial-of-service (DDoS) attacks against critical infrastructure.  Discovered by…
Posted by shaikh Saqib March 12, 2025
From Krebs on Security – Microsoft: 6 Zero-Days in March 2025 Patch Tuesday
Posted inArticles

From Krebs on Security – Microsoft: 6 Zero-Days in March 2025 Patch Tuesday

Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are already seeing active exploitation. Read More  
Posted by shaikh Saqib March 12, 2025
From Dark Reading – Trump Taps Sean Plankey To Fill Empty CISA Director Chair
Posted inNews

From Dark Reading – Trump Taps Sean Plankey To Fill Empty CISA Director Chair

Plankey has served in numerous cybersecurity positions in the past, including during the first Trump presidency from 2018-2020. Read More  
Posted by shaikh Saqib March 12, 2025
From Cybersecurity Help – New Ballista botnet targets unpatched TP-Link Archer routers
Posted inVulnerabilities

From Cybersecurity Help – New Ballista botnet targets unpatched TP-Link Archer routers

More than 6,000 devices have already been infected by Ballista.  ​ Read More  ​ 
Posted by shaikh Saqib March 11, 2025

Posts pagination

Previous page 1 2 3 4 5 … 9 Next page

Latest Posts

  • From Cyber Security News – New PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB for Credential TheftMay 8, 2026
  • From Cyber Security News – New NWHStealer Delivery Chain Uses Bun Loader, Anti-VM Checks, and Encrypted C2May 8, 2026
  • From Graham Cluley – Sri Lanka makes 37 arrests as it raids another scam centreMay 8, 2026
  • From Security Week – ‘PCPJack’ Worm Removes TeamPCP Infections, Steals CredentialsMay 8, 2026
  • From Cyber Security News – Mozilla Patches 423 Firefox 0-Day Vulnerabilities with Claude Mythos and Other AI ModelsMay 8, 2026
Total Visitors
1500661

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top