Ivanti EPMM Security Flaws Exploited By Hackers
Two newly identified Ivanti Endpoint Manager Mobile (EPMM) security flaws, are under active exploitation by a sophisticated hacking group believed to be operating from China. The vulnerabilities, when used together, enable attackers to bypass authentication and remotely execute malicious code, potentially giving them full control of targeted systems. The Vulnerabilities Explained Security experts have flagged two critical issues in Ivanti’s

UK Legal Aid Agency Data Breach: Sensitive Information Stolen
The UK Legal Aid Agency (LAA) has confirmed a significant data breach following a cyberattack. The attack compromised sensitive personal information of legal aid applicants, some of which dates back as far as 2010. The breach, uncovered on April 23, 2025, has sparked serious concerns about data protection in the public sector and the security of vulnerable individuals relying on

RVTools Website Hacked to Spread Bumblebee Malware
In a concerning case of software supply chain compromise, the official RVTools website was hacked to distribute malware. RVTools is a trusted utility used by VMware administrators. The installer, normally used to help IT professionals audit virtual environments, was tampered with to deliver the Bumblebee malware loader, a known precursor to ransomware attacks. This incident underscores the persistent and growing

Venom Spider Phishing Attack Targets HR Departments
In the evolving world of cybercrime, threat actors are continuously seeking new entry points into organizations. A new spear-phishing campaign has recently drawn attention for its clever targeting of an often-overlooked department: human resources. This phishing attack, orchestrated by the financially motivated group known as Venom Spider, leads to stolen credentials, remote access and more. A Deceptive Approach Venom Spider

Darcula PhaaS Is Behind Nearly 884,000 Stolen Credit Cards
Phishing attacks are becoming more advanced and more accessible to cybercriminals than ever before. One of the most alarming examples to date is Darcula, a Phishing-as-a-Service (PhaaS) platform that has enabled criminals to steal nearly 884,000 credit card numbers in a sophisticated, widespread campaign. As the phishing landscape evolves, Darcula shows just how professionalized and industrialized cybercrime has become. What

Luna Moth Cybercriminals Impersonate IT Support to Steal Data
In a rapidly evolving threat landscape, a cybercrime group known as Luna Moth - also referred to as the Silent Ransom Group (SRG) - has been targeting organizations in the United States using a cunning form of social engineering. Their latest campaign involves impersonating internal IT support teams. They manage to trick employees into granting remote access to corporate systems,

Fake WordPress Security Plugin Grants Access to Attackers
A new and highly deceptive cybersecurity threat has emerged targeting WordPress websites. Cybercriminals have developed a fake WordPress security plugin that not only pretends to protect websites but in reality, grants attackers remote administrative access. How the Attack Works The fake WordPress security plugin masquerades as a legitimate security tool. One of the known malicious files is named WP-antymalwary-bot.php. This

Co-Op Shuts Down IT Systems After Attempted Hack
The Co-Op shuts down IT systems as a precautionary measure. One of the UK’s largest consumer co-operatives, was forced to shut down parts of its IT infrastructure after detecting a potential cyberattack attempt. While services are gradually being restored, the proactive move was made to safeguard customer data and prevent further risks. What Made Co-Op Shut Down IT Systems? Co-op

Banking Credentials of 30,000 Australians Stolen: What You Need to Know
A wave of cyberattacks has compromised the banking credentials of over 30,000 Australians. This breach wasn’t the result of a direct attack on banks, but rather malware installed on users' own devices. Known as infostealers, this malware silently collects login credentials and personal data, often without users realizing it. This information comes from a recent report by Australian cybersecurity company

Fortinet Exposes Persistent Post-Exploitation Threat
Fortinet has issued a new security warning. Hackers still have access to patched FortiGate VPN devices. They use a hidden method that bypasses traditional detection. Compromise Notification Sent to Customers The company alerted affected customers via email. The message was titled: “Notification of device compromise – FortiGate / FortiOS – Urgent action required.” This notification carried a TLP:AMBER+STRICT label, showing
