The Breach News

Citrix Issues Security Patch for NetScaler Console Privilege Escalation Flaw

Citrix has issued crucial security updates addressing a significant vulnerability that affects NetScaler Console and NetScaler Agent, potentially leading to privilege escalation under specific conditions. As highlighted by Citrix, this flaw, identified as CVE-2024-12284, has been awarded a CVSS v4 score of 8.8 out of 10, marking it as a…

Read MoreCitrix Issues Security Patch for NetScaler Console Privilege Escalation Flaw

More Than a Dozen Android Apps on Google Play Store Found Distributing Banking Malware

A recent cybersecurity campaign has exploited ostensibly harmless Android dropper apps available on the Google Play Store to infiltrate users’ devices with banking malware. Dubbed DawDropper by security analysts at Trend Micro, this malicious operation involved 17 dropper applications masquerading as productivity and utility tools, including document scanners, VPN services,…

Read MoreMore Than a Dozen Android Apps on Google Play Store Found Distributing Banking Malware

Chinese Spy Tool Found Within US Systems

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Researchers Uncover Covert Chinese Access to US Service Provider Infrastructure Chris Riotta (@chrisriotta) • September 24, 2025 Image: Visut Chaivithooanukul/Shutterstock In a significant cybersecurity revelation, researchers have elucidated a long-running Chinese-linked cyberespionage campaign that infiltrated U.S. infrastructure and various enterprise service providers…

Read MoreChinese Spy Tool Found Within US Systems

North Korean Hackers Unleash OtterCookie Malware in Widespread Interview Scheme

Recent cybersecurity revelations highlight the activities of North Korean threat actors, specifically within the context of the ongoing Contagious Interview campaign. This campaign has introduced a new JavaScript malware identified as OtterCookie, further escalating the threat landscape. Known as Contagious Interview (alternatively termed DeceptiveDevelopment), this persistent attack strategy employs social…

Read MoreNorth Korean Hackers Unleash OtterCookie Malware in Widespread Interview Scheme

CISA: Federal Agency Compromised Due to GeoServer Vulnerability – Dark Reading

CISA Reports Breach Linked to GeoServer Vulnerability A recent security incident has come to light involving a breach at a federal agency, attributed to a vulnerability in GeoServer, a popular open-source server used for sharing geospatial data. The Cybersecurity and Infrastructure Security Agency (CISA) has confirmed this attack, raising significant…

Read MoreCISA: Federal Agency Compromised Due to GeoServer Vulnerability – Dark Reading

China-Linked Attackers Leverage Check Point Vulnerability to Deploy ShadowPad and Ransomware

New Cyber Threat Campaign Targets European Healthcare Sector with Advanced Ransomware Techniques A newly identified threat actor has launched a campaign aimed at European organizations, particularly within the healthcare industry. This operation, dubbed “Green Nailao” by Orange Cyberdefense CERT, utilizes the PlugX and ShadowPad malware, with the final stage involving…

Read MoreChina-Linked Attackers Leverage Check Point Vulnerability to Deploy ShadowPad and Ransomware

Increasing Malware Attacks Utilizing Dark Utilities’ C2-as-a-Service

A newly emerging service known as Dark Utilities has gained popularity among cybercriminals, with approximately 3,000 users drawn to its capability to provide command-and-control (C2) services aimed at seizing control of compromised systems. This platform has positioned itself as a “C2-as-a-Service” (C2aaS), marketed for tasks including remote access, command execution,…

Read MoreIncreasing Malware Attacks Utilizing Dark Utilities’ C2-as-a-Service

Hackers Concealed Malware Using Complex AI Code

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Attackers Conceal Malware Within Vector Image Rashmi Ramesh (rashmiramesh_) • September 24, 2025 Image: Shutterstock Recent findings indicate that hackers have utilized artificial intelligence-generated code to embed malware in a sophisticated phishing campaign, according to insights from Microsoft. This malware…

Read MoreHackers Concealed Malware Using Complex AI Code