CrushFTP’s Unauthenticated Access Flaw Discovered
CrushFTP has warned users to patch an unauthenticated access flaw immediately, affecting all v11 versions. The vulnerability enables attackers to gain unauthorized access to unpatched CrushFTP v11 servers, particularly those…
Moscovium Ransomware
Moscovium ransomware is a malicious program that locks files on a victim's computer by encrypting them, then demands a ransom, usually in Bitcoin, to unlock them. In this post, we…
Behavior:Win32/Rugmigen.B
Behavior:Win32/Rugmigen.B - Complete Detection and Removal Guide Behavior:Win32/Rugmigen.B Summary Threat Name Behavior:Win32/Rugmigen.B Type Behavioral Detection (Trojan Downloader/Infostealer) Detection Method Heuristic Analysis by Microsoft Defender Affected Systems Windows 7, 8, 10,…
FBI Issues Online File Converter Malware Scam Warning
The FBI Denver Field Office has warned about a growing scam involving free online file converter tools, which appears to be a significant cybersecurity concern. These tools, while converting files…
HackTool:Win64/GameHack!rfn – Game Hacking Malware
HackTool:Win64/GameHack!rfn is a Windows Defender detection for potentially dangerous game cheating software. Beyond their advertised functionality, these tools often contain hidden malicious features that can steal credentials, install additional malware,…
Trojan:Win32/SmokeLoader: Complete Detection & Removal Guide 2025
Trojan:Win32/SmokeLoader is a sophisticated backdoor malware that has remained active in the threat landscape since 2011. It primarily functions as a downloader, delivering additional malicious payloads to infected systems while…
CVE-2025-24071 Windows File Explorer Spoofing Vulnerability Uncovered, Patch Now
Microsoft uncovered the information about a critical vulnerability in Windows File Explorer, CVE-2025-24071, with a CVSS score of 7.5. It allows attackers to leak NTLM hashes, which can be used…
StilachiRAT: The Emerging Crypto-Stealing Malware Threat
$34.6 million in cryptocurrency could be at risk from StilachiRAT, a complex remote access trojan first detected by Microsoft Incident Response in November 2024. Unlike conventional ransomware that announces its…
Steganography Attack
Researchers have discovered a non-obvious tactic in which attackers use steganography. While classic tactics rely on obfuscation and encryption, this method uses plain images as a malware carrier. In this…
MassJacker Malware
Cybersecurity researchers have found MassJacker, a new, previously undocumented malware. It targets a predominantly freebie-seeking audience, i.e. users of pirated content. MassJacker Malware Targets Piracy Users MassJacker is a recently…
Jaguar Land Rover Data Breach Involved Two Attacks
Jaguar Land Rover suffered a significant data breach. Two hackers are said to have exploited stolen Jira credentials, leaking sensitive information. The leaked data, including source code, employee details, and…
Trojan:Win64/RustyStealer.DSK!MTB
Trojan:Win64/RustyStealer.DSK!MTB is a sophisticated malware designed to infiltrate 64-bit Windows systems, primarily focusing on stealing sensitive information such as login credentials, financial data, and personal details. It operates silently, making…