Aggregator
Mitigating malware and ransomware attacks
15th December – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 15th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The Indian government confirmed cyber incidents involving GPS spoofing at seven major airports, including Delhi, Mumbai, Kolkata, and Bengaluru. The attack affected aircrafts using GPS-based landing procedures. Despite signal disruption to navigation […]
The post 15th December – Threat Intelligence Report appeared first on Check Point Research.
Jaguar Land Rover confirms staff data stolen in cyberattack
Вселенная штампует Земли как на конвейере? Новая теория намекает, что мы не одни
New Android Malware Mimic as mParivahan and e-Challan Attacking Android Users to Steal Login Credentials
A sophisticated Android malware campaign named NexusRoute is actively targeting Indian citizens by impersonating government services. The operation uses fake versions of the official mParivahan and e-Challan applications to harvest login credentials and financial information from unsuspecting users. This coordinated attack combines phishing websites, fraudulent payment interfaces, and advanced malware to execute a multi-stage theft […]
The post New Android Malware Mimic as mParivahan and e-Challan Attacking Android Users to Steal Login Credentials appeared first on Cyber Security News.
Hamas Linked Hackers Using AshTag Malware Against Diplomatic Offices
MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin
Google links more Chinese hacking groups to React2Shell attacks
Fairy Mobile GUI Agent——RGR、OCA、EMA的综合落地
Critical Plesk Vulnerability Allows Plesk Users to Gain Root-Level Access
A severe security vulnerability has been discovered in Plesk for Linux that could allow users to gain root access on affected servers. The flaw, tracked as CVE-2025-66430, exists within Plesk’s Password-Protected Directories feature and allows attackers to inject arbitrary data into Apache configuration files. The vulnerability stems from improper handling of user input within the […]
The post Critical Plesk Vulnerability Allows Plesk Users to Gain Root-Level Access appeared first on Cyber Security News.