17 Firefox add-ons (50K+ downloads) hid malicious JS in their logo images to hijack links, inject tracking, and carry out ad fraud. Check and remove suspicious extensions now.
🔗 sctocs.com/ghostposter-...
17 Firefox add-ons (50K+ downloads) hid malicious JS in their logo images to hijack links, inject tracking, and carry out ad fraud. Check and remove suspicious extensions now.
🔗 sctocs.com/ghostposter-...
A China-linked threat actor is hacking government networks with ShadowPad and FINALDRAFT malware, turning compromised servers into stealthy C2 relays. Secure exposed services now.
🔗 sctocs.com/china-linked...
A China-linked threat actor is hacking government networks with ShadowPad and FINALDRAFT malware, turning compromised servers into stealthy C2 relays. Secure exposed services now.
🔗 sctocs.com/china-linked...
Compromised IAM credentials are fueling a large crypto mining campaign in AWS. Rotate keys, enforce MFA, and monitor cloud usage urgently.
🔗 sctocs.com/compromised-...
Compromised IAM credentials are fueling a large crypto mining campaign in AWS. Rotate keys, enforce MFA, and monitor cloud usage urgently.
🔗 sctocs.com/compromised-...
A malicious NuGet package impersonating Tracer Fody is stealing cryptocurrency wallet data. Audit and secure your dependencies immediately.
🔗 sctocs.com/rogue-nuget-...
A malicious NuGet package impersonating Tracer Fody is stealing cryptocurrency wallet data. Audit and secure your dependencies immediately.
🔗 sctocs.com/rogue-nuget-...
Active attacks are exploiting a SAML SSO authentication bypass in Fortinet FortiGate devices. Patch and review configurations urgently.
🔗 sctocs.com/fortinet-for...
Active attacks are exploiting a SAML SSO authentication bypass in Fortinet FortiGate devices. Patch and review configurations urgently.
🔗 sctocs.com/fortinet-for...
Active exploitation of React2Shell is being used to deploy Linux backdoors. Patch exposed applications and monitor servers urgently.
🔗 sctocs.com/react2shell-...
Active exploitation of React2Shell is being used to deploy Linux backdoors. Patch exposed applications and monitor servers urgently.
🔗 sctocs.com/react2shell-...
Amazon exposed a years-long GRU cyber-espionage campaign targeting energy and cloud infrastructure. Organizations should reassess defenses immediately.
🔗 sctocs.com/amazon-expos...
Amazon exposed a years-long GRU cyber-espionage campaign targeting energy and cloud infrastructure. Organizations should reassess defenses immediately.
🔗 sctocs.com/amazon-expos...
🔗 sctocs.com/google-dark-...
🔗 sctocs.com/google-dark-...
A featured Chrome extension was caught intercepting millions of AI chat conversations, raising serious privacy concerns. Audit and limit extension permissions.
🔗 sctocs.com/chrome-exten...
A featured Chrome extension was caught intercepting millions of AI chat conversations, raising serious privacy concerns. Audit and limit extension permissions.
🔗 sctocs.com/chrome-exten...
Critical SQLi, file upload, and AUTHTYPE bypass flaws in FreePBX could lead to RCE. Patch immediately to prevent compromise.
🔗 sctocs.com/freepbx-crit...
Critical SQLi, file upload, and AUTHTYPE bypass flaws in FreePBX could lead to RCE. Patch immediately to prevent compromise.
🔗 sctocs.com/freepbx-crit...
A hard-coded master key allows free decryption of files encrypted by VolkLocker ransomware. Victims may recover data without paying.
🔗 sctocs.com/volklocker-r...
A hard-coded master key allows free decryption of files encrypted by VolkLocker ransomware. Victims may recover data without paying.
🔗 sctocs.com/volklocker-r...
ISO-based phishing emails are spreading Phantom Stealer, targeting the Russian finance sector. Restrict ISO files and strengthen email defenses.
🔗 sctocs.com/phantom-stea...
ISO-based phishing emails are spreading Phantom Stealer, targeting the Russian finance sector. Restrict ISO files and strengthen email defenses.
🔗 sctocs.com/phantom-stea...
An actively exploited Sierra Wireless router vulnerability enabling RCE attacks has been added to CISA’s KEV list. Patch and secure devices urgently.
🔗 sctocs.com/cisa-sierra-...
An actively exploited Sierra Wireless router vulnerability enabling RCE attacks has been added to CISA’s KEV list. Patch and secure devices urgently.
🔗 sctocs.com/cisa-sierra-...
Fake OSINT and GPT utility repos are spreading PyStoreRAT malware disguised as legitimate tools. Verify projects before cloning or running code.
🔗 sctocs.com/fake-osint-g...
Fake OSINT and GPT utility repos are spreading PyStoreRAT malware disguised as legitimate tools. Verify projects before cloning or running code.
🔗 sctocs.com/fake-osint-g...
New AI-powered phishing kits can bypass MFA and steal credentials at scale using real-time interception techniques. Organizations must harden identity defenses now.
🔗 sctocs.com/advanced-phi...
New AI-powered phishing kits can bypass MFA and steal credentials at scale using real-time interception techniques. Organizations must harden identity defenses now.
🔗 sctocs.com/advanced-phi...
New React Server Components vulnerabilities allow DoS attacks and potential source code exposure. Developers should review and mitigate immediately.
🔗 sctocs.com/react-rsc-vu...
New React Server Components vulnerabilities allow DoS attacks and potential source code exposure. Developers should review and mitigate immediately.
🔗 sctocs.com/react-rsc-vu...
Exploitation has escalated into large-scale attacks worldwide, forcing emergency mitigations. If you run vulnerable React apps, act now.
🔗 sctocs.com/react2shell-...
Exploitation has escalated into large-scale attacks worldwide, forcing emergency mitigations. If you run vulnerable React apps, act now.
🔗 sctocs.com/react2shell-...
NanoRemote is abusing the Google Drive API to stealthily control Windows systems, hiding C2 traffic inside legitimate cloud services.
🔗 sctocs.com/nanoremote-m...
NanoRemote is abusing the Google Drive API to stealthily control Windows systems, hiding C2 traffic inside legitimate cloud services.
🔗 sctocs.com/nanoremote-m...
WIRTE is using AshenLoader DLL sideloading to deploy the AshTag backdoor for stealthy spying and persistence. Monitor endpoints for abuse of trusted binaries.
🔗 sctocs.com/wirte-ashenl...
WIRTE is using AshenLoader DLL sideloading to deploy the AshTag backdoor for stealthy spying and persistence. Monitor endpoints for abuse of trusted binaries.
🔗 sctocs.com/wirte-ashenl...
An unpatched zero-day in Gogs is being actively exploited across 700+ instances. If your Gogs server is exposed, patch and restrict access immediately.
🔗 sctocs.com/unpatched-go...
An unpatched zero-day in Gogs is being actively exploited across 700+ instances. If your Gogs server is exposed, patch and restrict access immediately.
🔗 sctocs.com/unpatched-go...
Active attacks are exploiting hard-coded keys to gain unauthorized access and execute code on vulnerable Gladinet systems. Patch and review configurations urgently.
🔗 sctocs.com/gladinet-har...
Active attacks are exploiting hard-coded keys to gain unauthorized access and execute code on vulnerable Gladinet systems. Patch and review configurations urgently.
🔗 sctocs.com/gladinet-har...
Attackers are using React2Shell to spread crypto miners and new malware across multiple industries. If you run vulnerable React apps, patch and monitor immediately.
🔗 sctocs.com/react2shell-...
Attackers are using React2Shell to spread crypto miners and new malware across multiple industries. If you run vulnerable React apps, patch and monitor immediately.
🔗 sctocs.com/react2shell-...
Malicious WSDL files can be abused to write files and gain remote code execution in vulnerable .NET SOAP applications. High impact for enterprise services.
🔗 sctocs.com/dotnet-soapw...
Malicious WSDL files can be abused to write files and gain remote code execution in vulnerable .NET SOAP applications. High impact for enterprise services.
🔗 sctocs.com/dotnet-soapw...
Hackers are using malicious RAR files to execute code on vulnerable systems. Users on WinRAR ≤7.11 should update to 7.12+ right away.
👉 sctocs.com/winrar-cve-2...
Hackers are using malicious RAR files to execute code on vulnerable systems. Users on WinRAR ≤7.11 should update to 7.12+ right away.
👉 sctocs.com/winrar-cve-2...
🔗 sctocs.com/fortinet-iva...
🔗 sctocs.com/fortinet-iva...