Ivanti Workspace Control hardcoded key flaws expose SQL credentials

Ivanti has released security patches for three critical vulnerabilities in its Workspace Control solution, which could allow privilege escalation and system compromise through exploit of hardcoded cryptographic keys. The vulnerabilities affect versions prior to 10.19.10.0 and have not been exploited in the wild so far, but they pose a significant risk if targeted. #Ivanti #WorkspaceControl

Read More
Cybersecurity News | Daily Recap [09 Jun 2025]

Recent cybersecurity updates include Chinese state-sponsored actors exploiting the NICKNAME zero-click iMessage vulnerability to target high-profile individuals in the US and EU, while US authorities seize cryptocurrency linked to North Korean sanctions evasion. Multiple organizations, including NHS UK and United Natural Foods, suffered ransomware and cyberattacks affecting critical services and operations. #NICKNAMEExploit #UNC1151 #Qilin #MiraiBotnet #SalesforceZeroDay #CryptoPhishing

Read More
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets

SentinelLABS detected and thwarted reconnaissance and intrusion operations linked to the PurpleHaze and ShadowPad activity clusters, attributed with high confidence to China-nexus threat actors targeting SentinelOne and related organizations. Despite multiple sophisticated attacks between 2024 and 2025, SentinelOne’s infrastructure remained uncompromised, underscoring persistent threats to cybersecurity vendors and global industries. #PurpleHaze #ShadowPad #GOREshell #APT15 #UNC5174

Read More
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

SentinelOne reports on a series of cyber intrusions linked to China-nexus threat actors, targeting organizations across the globe from July 2024 to March 2025. These activities involve reconnaissance, lateral movement, and exploitation, primarily by the PurpleHaze group and related clusters, with implications for government, media, and IT sectors. #PurpleHaze #UNC5174…

Read More
⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

This cybersecurity update highlights recent critical vulnerabilities, advanced malware campaigns, and nation-state hacking activities, emphasizing the importance of proactive defense. Key incidents include Google Chrome fixing an exploited 0-day, PathWiper targeting Ukraine, and sophisticated zero-click attacks on iPhones. #ChromeZeroDay #PathWiper #SaltTyphoon…

Read More
UNC1151 Exploits Roundcube Flaw in Spear Phishing Attack

CERT Polska has warned about a spear phishing campaign exploiting a critical webmail vulnerability (CVE-2024-42009) used by the UNC1151 APT group to steal credentials from Polish organizations. The attack involved malicious emails that deployed Service Workers to intercept login information, highlighting the threat posed by sophisticated cyber espionage activities. #UNC1151 #CVE2024-42009…

Read More
Threat Research | Weekly Recap [08 June 2025]

This week’s cybersecurity recap highlights ongoing threats from phishing and social engineering campaigns targeting various sectors, including finance and government, with sophisticated tactics like fake CAPTCHA frameworks and Phishing-as-a-Service platforms. Malware developments include stealthy RATs such as DuplexSpy and Chaos RAT, along with advanced infostealers like OtterCookie, all posing significant risks to corporate and crypto assets; supply chain threats involve malicious repositories and compromised developer tools. The report also covers notable APT activities by groups like UNC5174, OilRig, and Kimsuky, alongside infrastructure attacks exploiting IoT and cloud misconfigurations. Emerging tools like RayV Lite facilitate hardware-level attacks, illustrating the evolving landscape of cyber threats. #ClickFix #FlowerStorm #LazarusGroup #ChaosRAT #Mirai #RayVLite

Read More