Security Guard Magazine
    Thumbnail
    ESET malware Kaspersky APT

    ToddyCat APT Group Exploits ESET Vulnerability for Stealthy Malware Attacks

    April 10, 2025 • 1 min read

    Security researchers discovered that the ToddyCat APT group exploited a DLL hijacking vulnerability in ESET's software to deploy sophisticated malware. The attack leveraged multiple stealth techniques including encrypted payloads and memory-based execution to evade detection.

    Thumbnail
    Ivanti CISA China malware

    Critical Ivanti Security Flaw Exploited by Chinese Hackers in Wild

    April 07, 2025 • 1 min read

    CISA reveals severe remote code execution vulnerability affecting multiple Ivanti products, including Connect Secure and Policy Secure gateways. Security researchers link active exploitation to Chinese cyber espionage group UNC5221 using sophisticated malware tools.

    Thumbnail
    cryptocurrency malware phishing Coinbase

    PoisonSeed Campaign Targets Crypto Users Through Compromised CRM Systems

    April 07, 2025 • 1 min read

    A sophisticated cybercrime operation dubbed PoisonSeed is exploiting compromised CRM accounts to launch cryptocurrency seed phrase poisoning attacks. The campaign uses phishing tactics to gain access to marketing systems and sends malicious recovery phrases that allow attackers to drain victims' digital wallets.

    Thumbnail
    Ivanti China malware cybersecurity

    Chinese State Hackers Exploit Critical Ivanti Flaw to Deploy Advanced Malware

    April 04, 2025 • 1 min read

    Security researchers reveal Chinese state-sponsored group UNC5221 is actively exploiting a critical Ivanti Connect Secure vulnerability to deploy sophisticated TRAILBLAZE and BRUSHFIRE malware. The high-severity flaw enables remote code execution through stack-buffer overflow, prompting urgent patching recommendations.

    Thumbnail
    Stripe e-commerce malware cryptocurrency

    Cybercriminals Exploit Legacy Stripe API to Validate Stolen Card Data in Sophisticated Skimming Campaign

    April 03, 2025 • 1 min read

    Researchers uncovered a web skimming operation targeting 49 e-commerce merchants by exploiting Stripe's deprecated API to validate stolen payment cards. The sophisticated attack injects malicious code mimicking legitimate checkout pages while leveraging cryptocurrency options and automated customization tools.

    Thumbnail
    FIN7 malware Windows Python

    Russian Cybercrime Group FIN7 Deploys Sophisticated Anubis Backdoor for Windows Systems

    April 02, 2025 • 1 min read

    FIN7's latest Python-based malware, Anubis, enables comprehensive remote system control while evading detection through advanced techniques. The backdoor, distributed via phishing campaigns, features modular design, encrypted communications, and capabilities including remote command execution and keylogging.

    Thumbnail
    Microsoft Teams malware vishing

    Microsoft Teams Voice Phishing Campaign Deploys Malware Through Remote Support Tools

    April 01, 2025 • 1 min read

    A sophisticated phishing attack using Microsoft Teams voice calls has been discovered targeting organizations by deploying malware through legitimate remote tools. The multi-stage attack combines social engineering with technical exploitation, highlighting growing concerns about AI-enabled social engineering threats.

    Thumbnail
    malware Ivanti China cybersecurity

    RESURGE: Advanced Chinese Malware Targets Ivanti Security Products with Sophisticated Rootkit Features

    March 30, 2025 • 1 min read

    A dangerous new malware called RESURGE has been discovered exploiting Ivanti Connect Secure devices through a critical vulnerability. The sophisticated attack tool, linked to Chinese cyber espionage groups, introduces advanced persistence capabilities including rootkits and web shells.

    Thumbnail
    DeepSeek Google malware cybersecurity

    Malicious Google Ads Target DeepSeek Users in Sophisticated Malware Campaign

    March 29, 2025 • 1 min read

    Security researchers uncover a deceptive advertising scheme using Google Ads to spread malware by impersonating the DeepSeek AI platform. The incident highlights growing cybersecurity concerns around AI tools and search result manipulation, prompting increased vigilance when downloading software.

    Thumbnail
    malware Apple cybersecurity

    Multi-Language ReaderUpdate Malware Variants Target Apple Systems

    March 26, 2025 • 1 min read

    A sophisticated malware operation targeting macOS has evolved to include variants written in Crystal, Nim, Rust, and Go programming languages. The expanded capabilities allow for system information collection, remote command execution, and potential pay-per-install operations while employing advanced obfuscation techniques.

  • 1
  • 2
  • 3
  • Next

Free Security Guards Resource and Information Magazine