Qilin
You must login to view this content
You must login to view this content
The notorious Russian cyberespionage group Fancy Bear, also known as APT28, has intensified its operations against governments and military entities worldwide using an arsenal of sophisticated new tools and techniques. Active since 2007, this state-sponsored threat actor has established itself as one of the most persistent and dangerous cyber adversaries, with a documented history of […]
The post Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools appeared first on Cyber Security News.
The hackers were allegedly involved in operations against Ukraine and a Russian on U.K. soil, the latter with malware tied to U.S. 2016 election interference.
The post UK sanctions Russian hackers, spies as US weighs its own punishments for Russia appeared first on CyberScoop.
You must login to view this content
You must login to view this content
A sophisticated malware campaign targeting Ivanti Connect Secure VPN devices has been actively exploiting critical vulnerabilities CVE-2025-0282 and CVE-2025-22457 since December 2024. The ongoing attacks demonstrate advanced persistent threat techniques, deploying multiple malware families including MDifyLoader, Cobalt Strike Beacon, vshell, and Fscan to establish long-term access to compromised networks. The attack begins with threat actors […]
The post Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon appeared first on Cyber Security News.
Three critical vulnerabilities in the Sophos Intercept X for Windows product family could allow local attackers to achieve arbitrary code execution with system-level privileges. Identified as CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, the flaws span registry permission misconfigurations, a weakness in the Device Encryption component, and an issue in the Windows installer running under the SYSTEM account. […]
The post Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution appeared first on Cyber Security News.