Skip to content
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multi-stage malware. “The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems,” Trend Micro researchers Jovit Samaniego, Aira Marcelo,Read More »Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Chrome 137 Update Patches High-Severity Vulnerabilities

Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek.

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little more than three years in prison for unlawfully retaining and transmitting top secret National Defense Information (NDI) to people who were not entitled to receive them and for attempting to cover up the malicious activity. Asif WilliamRead More »Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel in its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2023-0386 (CVSS score: 7.8), is an improper ownership bug in the Linux kernel thatRead More »CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Veeam has rolled out patches to contain a critical security flaw impacting its Backup & Replication software that could result in remote code execution under certain conditions. The security defect, tracked as CVE-2025-23121, carries a CVSS score of 9.9 out of a maximum of 10.0. “A vulnerability allowing remote codeRead More »Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict

Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict

Iran has throttled internet access in the country in a purported attempt to hamper Israel’s ability to conduct covert cyber operations, days after the latter launched an unprecedented attack on the country, escalating geopolitical tensions in the region. Fatemeh Mohajerani, the spokesperson of the Iranian Government, and the Iranian CyberRead More »Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict

Uncovering a Tor-Enabled Docker Exploit

Uncovering a Tor-Enabled Docker Exploit

A recent attack campaign took advantage of exposed Docker Remote APIs and used the Tor network to deploy a stealthy cryptocurrency miner. This blog breaks down the attack chain.

Copyright © 2025 infosecintel.net