Alerts List
AL2025_39 PyPI Invalidates Tokens Stolen in GhostAction Supply Chain Attack (September 23rd, 2025) 
Description  In September 2025, the Python Software Foundation (PSF) canceled all PyPI tokens stolen in the GhostAction attack. These tokens, which le . . . Read more

Date Publish: Sep 23rd 25
AL2025_38 Microsoft and Cloudflare Disrupt Massive RacoonO265 Phishing Operation (September 22nd, 2025)
Description A large phishing operation known as RaccoonO365 has been taken down through a joint effort by Microsoft, Cloudflare, and law enforcement. . . . Read more

Date Publish: Sep 22nd 25
AL2025_37 Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware (September 19th, 2
Description  The cybercrime group Silver Fox (aka SwimSnake, UTG-Q-1000, Void Arachne) has been linked to a Bring Your Own Vulnerable Driver (BYOVD) c . . . Read more

Date Publish: Sep 19th 25
AL2025_36 FortiWeb CVE-2025-52970 Exploit Released: Full Authentication Bypass Risk (August 18, 2025)
Description  A newly disclosed vulnerability in Fortinet’s FortiWeb Web Application Firewall (WAF), tracked as CVE-2025-52970, allows remote attackers . . . Read more

Date Publish: Aug 18th 25
AL2025_35 SonicWall Devices Exploited in Latest Akira Ransomware Campaign (August 8th, 2025)
Description  There has been a surge in Akira ransomware attacks targeting SonicWall firewall devices with SSL VPN enabled, initially suspected to be e . . . Read more

Date Publish: Aug 8th 25
AL2025_33 New Secure Boot Flaw Enables Bootkit Malware Installation (June 17, 2025)
Description  Security researchers have disclosed a critical Secure Boot bypass vulnerability, tracked as CVE-2025-3052, that allows attackers to disab . . . Read more

Date Publish: Jun 17th 25
AL2025_32 Anubis Ransomware Adds Wiper to Destroy Files Beyond Recovery (June 17, 2025)
Description  The Anubis ransomware-as-a-service (RaaS) operation, first identified in December 2024, has evolved into a more destructive threat by inc . . . Read more

Date Publish: Jun 17th 25
AL2025_31 FIN6 Hackers Pose as Job Seekers to Backdoor Recruiters’ Devices (June 11, 2025)
Description  The FIN6 threat group, also known as “Skeleton Spider,” has launched a sophisticated social engineering campaign targeting human resource . . . Read more

Date Publish: Jun 11th 25
AL2025_30 PumaBot Botnet Targets IoT Devices Using SSH Brute Force Attacks (June 11, 2025)
Description  A newly identified Go-based Linux malware, dubbed PumaBot, is targeting Internet of Things (IoT) devices through SSH brute force attacks . . . Read more

Date Publish: Jun 11th 25
AL2025_29 Malicious WordPress Plugin Disguised as Security Tool Injects Backdoor (June 11, 2025)
Description  A sophisticated malware campaign is targeting WordPress websites using a malicious plugin masquerading as a security tool. Discovered by . . . Read more

Date Publish: Jun 11th 25
AL2025_28 OttoKit WordPress Plugin Auth Bypass Vulnerability Exploited Within Hours (June 11, 2025)
Description  A high-severity authentication bypass vulnerability (CVE-2025-3102) in the OttoKit WordPress plugin (formerly known as SureTriggers) has . . . Read more

Date Publish: Jun 11th 25
AL2025_27 Fake Microsoft Office Add-ins Distribute Malware via SourceForge (June 11, 2025)
Description  A new malware campaign has been uncovered exploiting the SourceForge platform to distribute fake Microsoft Office add-in tools. These mal . . . Read more

Date Publish: Jun 11th 25