Murdoc Botnet Ensnaring Avtech, Huawei Devices
The Mirai-based Murdoc botnet has been actively targeting Avtech and Huawei devices for roughly half a year.
The post Murdoc Botnet Ensnaring Avtech, Huawei Devices appeared first on SecurityWeek.
The Mirai-based Murdoc botnet has been actively targeting Avtech and Huawei devices for roughly half a year.
The post Murdoc Botnet Ensnaring Avtech, Huawei Devices appeared first on SecurityWeek.
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden rootkit. The activity has been attributed with medium confidence to a Chinese hacking group called Silver Fox (aka Void Arachne), citing similarities in tradecraft with previous campaigns attributed…
Europol on Monday announced the arrest of the suspected administrator of XSS.is (formerly DaMaGeLaB), a notorious Russian-speaking cybercrime platform. The arrest, which took place in Kyiv, Ukraine, on July 222, 2025, was led by the French Police and Paris Prosecutor, in collaboration with Ukrainian authorities and Europol. The action is the result of an investigation…
The cybersecurity landscape in 2025 will demand a careful balance between robust defense mechanisms and adaptive resilience. The post Anticipating the Cyber Frontier: Top Predictions for 2025 appeared first on SecurityWeek.
The threat group targeted a LANSCOPE zero-day vulnerability (CVE-2025-61932)
Brian Hamrick reports: West Chester Township is dealing with the fallout of a second cyber-attack this month. On Tuesday morning, cyber attackers the township calls a “malicious group” struck, targeting the email server. ”At approximately 6:45 a.m., we were notified of a potential cyber-attack and data breach,” said West Chester Township public information officer Brianna……
Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. “These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing