Current Cyber Threats









Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites

A persistent, highly active threat actor, known for initially leveraging the ScreenConnect RMM software, has modified its tactics. The group is now infecting victim systems with multiple RMM tools, including LogMeIn Resolve, Naverisk, SimpleHelp, PDQ, and Atera, often installing them sequentially and long after the initial breach is successful.




Sneaky2FA PhaaS Kit Now Uses Redteamers' Browser-In-The-Browser Attack

Push researchers identified a new evolution in the Sneaky2FA Phishing-as-a-Service kit: the integration of Browser-in-the-Browser phishing capabilities. Sneaky2FA, already known for its MFA-bypass features and Telegram-based distribution, now deploys phishing pages that simulate legitimate pop-up authentication windows containing embedded reverse-proxy login forms.





CISA Issues New Guidance on Bulletproof Hosting Threat

CISA, in collaboration with the U.S. National Security Agency, U.S. Department of Defense Cyber Crime Center, U.S. Federal Bureau of Investigation, and international partners, have released the guide Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers to help internet service providers (ISPs) and network defenders mitigate cybercriminal activity enabled by bulletproof hosting (BPH) providers.






























State-Sponsored Remote Wipe Tactics Targeting Android Devices

A recent campaign linked to North Korean threat actors is abusing Google's Find Hub to track and remotely wipe the Android devices of targeted South Koreans. The operation, attributed to the KONNI activity cluster, which overlaps with APT37 (ScarCruft) and Kimsuky (Emerald Sleet), relies on credential theft rather than exploiting any Google or Android vulnerabilities.



Microsoft November 2025 Patch Tuesday Fixes 1 Zero-Day, 63 Flaws

As part of the Microsoft November Patch Tuesday, the vendor issued security updates to address 63 flaws, including one actively exploited zero-day. Of the 63 flaws addressed, there were 29 Elevation of Privilege Vulnerabilities, 2 Security Feature Bypass Vulnerabilities, 16 Remote Code Execution Vulnerabilities, 11 Information Disclosure Vulnerabilities, 3 Denial of Service Vulnerabilities, and 2 Spoofing Vulnerabilities.