Cyber Attack

New StealC V2 Expands Capabilities to Exploit MS Installer Packages and PowerShell Scripts

StealC, a prominent infostealer and malware downloader on the cybercrime underground since early 2023, released its much-anticipated version 2 (V2), introducing significant enhancements in...

AiTM Attacks with Reverse Proxies Enable Threat Actors to Bypass MFA

In the ongoing battle between enterprises and cybercriminals, adversary-in-the-middle (AiTM) attacks using reverse proxy infrastructure have emerged as a powerful mechanism for bypassing multi-factor...

Tesla Model 3 VCSEC Flaw Enables Remote Code Execution by Attackers

A critical vulnerability in Tesla Model 3 vehicles, tracked as CVE-2025-2082, allowed attackers to execute arbitrary code remotely by exploiting the car’s tire pressure...

Apache ActiveMQ Flaw Enables Remote Code Execution by Attackers

A newly disclosed vulnerability in Apache ActiveMQ NMS OpenWire Client, tracked as CVE-2025-29953, allows remote attackers to execute arbitrary code on affected systems, raising...

Trellix Introduces Phishing Simulator to Strengthen Organization Defense Against Attacks

Trellix has announced the launch of Trellix Phishing Simulator, an advanced platform designed to empower organizations in the fight against phishing attacks by proactively...

Popular

Subscribe

spot_imgspot_img