Home

RansomHub via SocGholish, compromised sites

Threat actors behind SocGholish are now using hacked websites to spread RansomHub ransomware. The attack starts with compromised sites delivering malicious JavaScript to visitors. RansomHub via SocGholish SocGholish, a JavaScript-based [...]

SSRF Vulnerabilities Targeted by 400+ IPs in Coordinated Attack

GreyNoise has reported a coordinated wave of attacks exploiting Server-Side Request Forgery (SSRF) vulnerabilities across various platforms. According to the firm, over 400 IP addresses were identified actively targeting multiple [...]

Juniper Junos OS Vulnerability Exploited, CISA Warns

CISA has warned about a Junos OS vulnerability (CVE-2025-21590) in Juniper Networks. This flaw allows high-privileged local attackers to inject code, risking system compromise. It stems from weak security restrictions [...]

DCRat Malware Uses YouTube for Credential Theft

In 2025, a new wave of DCRat backdoor attacks has emerged, using the Malware-as-a-Service (MaaS) model. Cybercriminals behind this campaign distribute the malware and offer technical support and infrastructure for [...]

PHP XXE Vulnerability Exposes Config Files and Private Keys

A newly discovered XML External Entity (XXE) injection vulnerability in PHP allows attackers to bypass security measures and access sensitive configuration files and private keys. PHP XXE Vulnerability Web security [...]

Subscribe to our newsletter to receive security tips everday!