ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices – Go Health Pro

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices – Go Health Pro

May 23, 2025Ravie LakshmananThreat Intelligence / Network Security Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, … Read more

Critical infrastructure, critically compromised: It’s now a matter of resilience and survival – Go Health Pro

Critical infrastructure, critically compromised: It’s now a matter of resilience and survival – Go Health Pro

The United States is facing an unprecedented national security challenge — not from missiles or troops, but from the silent, embedded presence of adversaries inside its digital infrastructure. Intelligence officials have warned that countries like China already has deep access to U.S. power grids, water systems, transportation hubs, and other critical networks. These aren’t theoretical … Read more

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key – Go Health Pro

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key – Go Health Pro

Feb 01, 2025Ravie LakshmananVulnerability / Zero-Day BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company’s Remote Support SaaS instances by making use of a compromised API key. The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to … Read more

Whatsapp Accounts Compromised By Cyber Criminals – Go Health Pro

Whatsapp Accounts Compromised By Cyber Criminals – Go Health Pro

WhatsApp accounts compromised by Cyber Criminals: The latest Whatsapp Phishing attack highlights the growing sophistication of phishing campaigns, particularly those targeting organisations with a high volume of sensitive data or a role in international affairs. Star Blizzard’s WhatsApp phishing tactic demonstrates technical ingenuity and a deep understanding of human behaviour, exploiting trust in familiar platforms … Read more

Chrome extensions compromised in Christmas Day supply chain attack – Go Health Pro

Chrome extensions compromised in Christmas Day supply chain attack – Go Health Pro

In a supply chain attack that was first detected on Dec. 25, several Chrome extensions were compromised after a Cyberhaven employee was tricked by a phishing email that stole the worker’s credentials to the Google Chrome Web Store. A Dec. 27 blog post by Cyberhaven explained the attacker used these credentials on Dec. 24 to … Read more