Reza Rafati
-

Chinese State-Backed Hackers Weaponize Old Software Flaws for Global Espionage
Chinese state-backed hackers are exploiting old software vulnerabilities like Log4j and Microsoft IIS for global espionage, bypassing advanced defenses. This highlights the critical need for rigorous patch management against seemingly dated flaws.
-

Russia Enacts New Reservist Law Amid Ukraine War, Sparking ‘Hidden Mobilization’ Concerns
A new Russian law allowing reservist call-ups for ‘special training’ amid the Ukraine war has sparked concerns of a ‘hidden mobilization’ to bolster forces, though its impact remains debated.
-

Samsung Patches High-Severity Flaw Allowing Remote Code Execution on Android Devices
Samsung has patched a high-severity flaw, CVE-2025-21042, in its Android devices, which could allow remote code execution without user interaction. Users are urged to apply the April 2025 Security Maintenance Release promptly to protect against this vulnerability.
-

Hidden “Logic Bombs” Found in Popular Software Packages, Threatening Future Industrial Sabotage and Data Corruption
Security researchers have uncovered a new wave of ‘logic bombs’ hidden within commonly used software, designed to disrupt critical industrial systems and corrupt databases, posing significant challenges for detection and forensic investigation.
-

Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
A previously unidentified threat cluster, codenamed UNK_SmudgedSerpent, has been linked to a series of cyberattacks targeting academics and foreign policy experts in the U.S. during June-August 2025.
-

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks
Federal prosecutors in the United States have indicted three individuals, including cybersecurity professionals, for allegedly hacking into the networks of five U.S. companies using BlackCat (also known as ALPHV) ransomware between May and November 2023. The group is accused of deploying the ransomware and extorting victims for cryptocurrency payments.
-

WordPress Sites Targeted by Critical Post SMTP Plugin Vulnerability
A critical vulnerability in the Post SMTP WordPress plugin (CVE-2025-11833) is actively being exploited, risking websites with over 400,000 active installations. Attackers can access email logs to intercept sensitive information, reset administrator passwords, and gain full control of websites. The vulnerability was discovered on October 11, 2025, and a patch (version 3.6.1) was released on…
-

U.S. Prosecutors Indict Three in BlackCat Ransomware Scheme
Federal prosecutors in the United States have indicted three individuals for allegedly operating as part of a BlackCat (ALPHV) ransomware operation, targeting five U.S. companies and extorting significant sums.
-

YouTube Ghost Network Leverages Deceptive Tactics for Widespread Malware Distribution
A sophisticated and coordinated malware distribution operation, dubbed the “YouTube Ghost Network” by Check Point Research, has been actively exploiting YouTube’s features to promote malicious content and distribute information-stealing malware.
-

Aisuru Botnet Shifts to Residential Proxies for AI Data Harvesting
The Aisuru botnet has shifted from DDoS attacks to operating as a residential proxy service, enabling cybercriminals to anonymize traffic for illicit activities, including extensive data harvesting for AI projects, impacting 700,000 compromised IoT devices.