The Malware newsletter from Infosecbulletin features the top articles and research on malware from around the world.
The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for
By infosecbulletin
/ Friday , May 9 2025
YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
By infosecbulletin
/ Friday , May 9 2025
Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
By infosecbulletin
/ Thursday , May 8 2025
The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
By infosecbulletin
/ Thursday , May 8 2025
SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
By infosecbulletin
/ Thursday , May 8 2025
From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
By infosecbulletin
/ Thursday , May 8 2025
Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
By infosecbulletin
/ Wednesday , May 7 2025
Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
By infosecbulletin
/ Tuesday , May 6 2025
Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset
TodoSwift Disguises Malware Download Behind Bitcoin PDF
MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
PG_MEM: A Malware Hidden in the Postgres Processes
NGate Android malware relays NFC traffic to steal cash
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware
Meet UULoader: An Emerging and Evasive Malicious Installer
BlindEagle flying high in Latin America
Finding Malware: Unveiling NUMOZYLOD with Google Security Operations
New Backdoor Targeting Taiwan Employs Stealthy Communications
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove
Qilin ransomware caught stealing credentials stored in Google Chrome
Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language