Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware – Go Health Pro

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware – Go Health Pro

May 25, 2025Ravie LakshmananThreat Intelligence / Software Security Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. “Catena … Read more

Google warns of Russian hackers ColdRiver wielding new malware tools – Go Health Pro

Google warns of Russian hackers ColdRiver wielding new malware tools – Go Health Pro

A known Russian cybercrime outfit has armed itself with a new malware suite that allows for the theft of user accounts and credentials, posing a substantial threat to organizations in the West.The group known as “ColdRiver” has been spotted in the wild using a previously unknown piece of data-stealing malware designated as “LostKeys.” According to … Read more

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware – Go Health Pro

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware – Go Health Pro

May 03, 2025Ravie LakshmananMalware / Operational Technology An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The activity, which lasted from at least May 2023 to February 2025, entailed “extensive espionage operations and suspected network … Read more

Hackers exploiting vulnerabilities at higher rates, reports Verizon – Go Health Pro

Hackers exploiting vulnerabilities at higher rates, reports Verizon – Go Health Pro

Threat actors are opting for code exploitation at an increasing rate as credential theft is becoming less popular as a means of intrusion.Verizon’s latest Data Breach Investigation Report (DBIR) found that 1 in 5 breaches were the result of an exploit script against an exposed security vulnerability. By comparison, 22% of exploits were the result … Read more

Hacking the hackers… with a credit card? • Graham Cluley – Go Health Pro

Hacking the hackers… with a credit card? • Graham Cluley – Go Health Pro

A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that seem daft to you? And over in Nigeria, even if romance scammers would like to update their LinkedIn profiles, just how easy is it to turn a new leaf after a sweet-talking career in cybercrime? All this and more is … Read more