Sunday , February 23 2025

Recent Posts

“Astaroth” Phishing Kit Bypasses 2FA Of Gmail, Yahoo, AOL, M365

Astaroth

The new Astaroth Phishing Kit can bypass two-factor authentication to steal login credentials for Gmail, Yahoo, and Microsoft. It uses a reverse proxy, captures credentials in real-time, and hijacks sessions. The new phishing kit called Astaroth has been found on cybercrime networks by SlashNext threat researchers. Astaroth can bypass two-factor …

Read More »

CVE-2023-38831
Malware campaign target Bangladeshi Government Entities: Report

Government Entities

A sophisticated malware campaign is targeting military and government entities in Bangladesh. It uses social engineering to deliver malicious files disguised as official documents, aiming to infiltrate secure networks, steal credentials, and access sensitive systems. The attack starts with a WhatsApp message that forwards a file (like 508.rar) pretending to …

Read More »

(CVE-2025-1146
CrowdStrike Fixed High-Severity TLS Vuln in Falcon Sensor

CrowdStrike

CrowdStrike has issued a security advisory for a serious TLS vulnerability, CVE-2025-1146, in its Falcon Sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor. This vulnerability could enable man-in-the-middle (MiTM) attacks. CrowdStrike secures communications from the Falcon sensor to its cloud using standard TLS. However, a validation error …

Read More »