Thursday , September 18 2025
key

Malware Researchers detect 29 New Ransomwares in May

In May, cybersecurity experts found 29 new ransomware types. These malicious programs are a big danger to people and businesses. The cybercriminals keep improving their methods with each new type of ransomware, so it’s harder to detect and stop them.

Ransomware works by locking up important data on infected computers, making it impossible for users to access. Then, the criminals ask for a lot of money to unlock the data, putting victims in a difficult situation. This not only puts personal and private information at risk but also causes financial problems for the victims dailydarkweb reported.

Hacker claim to breach Link3; 189,000 Users data up for sale

A threat actor claims to have breached Link3, a major IT solutions and internet service provider based in Bangladesh. The...
Read More
Hacker claim to breach Link3; 189,000 Users data up for sale

Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Check point, a cyber security solutions provider hosts an event titled "securing the hyperconnected world in the AI era" at...
Read More
Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. Despite being recognized for over...
Read More
Microsoft Confirms 900+ XSS Vulns Found in IT Services

Daily Security Update Dated : 15.09.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.09.2025

IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local privileged users...
Read More
IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

Major Australian Banks using Army of AI Bots to Scam Scammers

Australian banks are now using bots to combat scammers. These bots mimic potential victims to gather real-time information and drain...
Read More
Major Australian Banks using Army of AI Bots to Scam Scammers

F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

F5 plans to acquire CalypsoAI, which offers adaptive AI security solutions. CalypsoAI's technology will be added to F5's Application Delivery...
Read More
F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Attacks

The Villager framework, an AI-powered penetration testing tool, integrates Kali Linux tools with DeepSeek AI to automate cyber attack processes....
Read More
AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Attacks

CVE-2025-21043
Samsung Patched Critical Zero-Day Flaw Exploited in Android Attacks

Samsung released its monthly Android security updates, addressing a vulnerability exploited in zero-day attacks. CVE-2025-21043 (CVSS score: 8.8) is a...
Read More
CVE-2025-21043  Samsung Patched Critical Zero-Day Flaw Exploited in Android Attacks

Albania appoints world’s first AI minister, “Diella” to Tackle Corruption

Albania has appointed the first AI-generated government minister to help eliminate corruption. Diella, the digital assistant meaning Sun, has been...
Read More
Albania appoints world’s first AI minister, “Diella” to Tackle Corruption

Wormhole
SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
Extensions: .Wormhole

KUZA
SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
Extensions: .Ripa

Qepi – Qehu
SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
Extensions: .qepi – .qehu

Baaa
SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
Extensions: .baa

MALARIA
SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
Extensions: .Four random characters

Xam
SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
Extensions: .xam

Qeza
SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
Extensions: .qeza

Vepi
SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
Extensions: .vepi

EnigmaWave
SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
Extensions: .EnigmaWave

Paaa
SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
Extensions: .paaa

Vehu
SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
Extensions: .vehu

Scrypt
SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
Extensions: .Scrypt

Capibara
SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
Extensions: .capibara

Lilium
SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
Extensions: .lilium

EDHST
SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
Extensions: .EDHST

OPIX
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .OPIX

GhosHacker
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .red

Veza
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .veza

OCEANS
SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
Extensions: .Four random characters

ZHO
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .Four random characters

Anyv
SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
Extensions: .Anyv

EMBARGO
SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
Extensions: .564ba1

SRC
SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
Extensions: .SRC

CAMBIARE ROTTA
SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
Extensions: .Four random characters

Zonix
SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
Extensions: .ZoN

Nett
SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
Extensions: .nett

Wintz
SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
Extensions: .Four random characters

Boost
SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
Extensions: .boost

QRYPT
SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
Extensions: .qcrypt

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

ransomware

Bengaluru firm got ransomware attack, Hacker demanded $70,000

Bengaluru’s Whiteboard Technologies Pvt Ltd was hit by a ransomware attack, with hackers demanding a …