Darcula PhaaS can now auto-generate phishing kits for any brand
https://www.bleepingcomputer.com/news/security/darcula-phaas-can-now-auto-generate-phishing-kits-for-any-brand/
Dropping a 0 day: Parallels Desktop Repack Root Privilege Escalation – Mickey's Blogs – Exploring the world with my sword of debugger :)
https://jhftss.github.io/Parallels-0-day/
Reversing, Discovering, And Exploiting A TP-Link Router Vulnerability — CVE-2024–54887 | by Joward | Jan, 2025 | InfoSec Write-ups
https://infosecwriteups.com/reversing-discovering-and-exploiting-a-tp-link-router-vulnerability-cve-2024-54887-341552c4b104
DPRK DriverEasy & ChromeUpdate Deep Dive
https://www.kandji.io/blog/drivereasy
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html
Microsoft testing fix for Windows 11 bug breaking SSH connections
https://www.bleepingcomputer.com/news/microsoft/microsoft-testing-fix-for-windows-11-bug-breaking-ssh-connections/
A Deep Dive into Brute Ratel C4 payloads – CYBER GEEKS
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads/
New NailaoLocker ransomware used against EU healthcare orgs
https://www.bleepingcomputer.com/news/security/new-nailaolocker-ransomware-used-against-eu-healthcare-orgs/
Atlassian Patches Critical Vulnerabilities in Confluence, Crowd - SecurityWeek
https://www.securityweek.com/atlassian-patches-critical-vulnerabilities-in-confluence-crowd/
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks - Securonix
https://www.securonix.com/blog/analyzing-deepdrive-north-korean-threat-actors-observed-exploiting-trusted-platforms-for-targeted-attacks/
China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
Mining Company NioCorp Loses $500,000 in BEC Hack - SecurityWeek
https://www.securityweek.com/mining-company-niocorp-loses-500000-in-bec-hack/
DeceptiveDevelopment targets freelance developers
https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/
CISA and FBI: Ghost ransomware breached orgs in 70 countries
https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/