Current Cyber Threats

Critical Android Vulnerabilities Patched—Update as Soon as You Can

Google's August 2025 Android Security Bulletin fixes six system and third-party component vulnerabilities. Two of these are critical: CVE-2025-48530, a remote code execution flaw in the System component with no user interaction, and CVE-2025-21479 (and CVE-2025-27038, CVE-2025-21480), relating to use-after-free bugs in Qualcomm Adreno GPU drivers.







PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Cleafy's Threat Intelligence team uncovered a global Malware-as-a-Service campaign that had been distributing the PlayPraetor remote access trojan (RAT) via fake impersonations of Google Play Store websites. It has infected over 11,000 Android devices worldwide, with particularly dense numbers found in Europe (Portugal, Spain, France), and observable spreads in Morocco, Peru, and Hong Kong.

























OT-ISAC Warns Singapore Critical Infrastructure of UNC3886 Exploiting Zero-Days in Fortinet, VMware,

The OT-ISAC (Operational Technology) has issued a threat alert regarding an active and highly coordinated cyber-espionage campaign by the Chinese state-sponsored APT group UNC3886, which is targeting Singapore's critical infrastructure. UNC3886, active since at least 2021, exploits zero-day vulnerabilities in FortiOS, VMware, Juniper, and ESXi hypervisors.








Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomwa

CloudSEK's TRIAD recently uncovered a Clickfix-themed malware delivery site associated with the Epsilon Red ransomware. Unlike previous Clickfix campaigns, this site directed victims to a secondary page instead of copying malicious commands to the clipboard after clicking on the “verify you are human” button.






NoName057(16)'s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months

NoName057(16) is a pro-Russian hacktivist group that emerged back in March 2022, right around the time the Russia-Ukraine conflict initiated. Since then, NoName057 has been actively launching DDoS attacks against targets of interest not only in Ukraine but also entities in European nations opposing Russia's invasion, such as France and Sweden.


CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing

CastleLoader is a sophisticated loader malware that emerged in early 2025, primarily used to distribute stealer malware and RATs through phishing techniques and fake GitHub repositories. Its most common delivery method leverages ClickFix phishing pages mimicking Cloudflare error screens, browser updates, or developer tools to convince victims to copy and execute PowerShell commands.




Wireline is Now the Most Vulnerable to Cyber Attacks: Netscout

According to Netscout's 2H 2024 DDoS Threat Intelligence Report, Wireline networks were the most frequently targeted by DDoS attacks in the second half of 2024. Between July and December 2024, wired telecommunication carriers faced a total of 524,445 DDoS attacks, significantly higher than the 24,433 attacks against wireless telecommunications carriers during the same period.