GPUGate Malware Campaign Uses Google Ads and Fake GitHub Commits to Target IT Companies

332/68 Wednesday, September 10, 2025 Cybersecurity researchers have uncovered a new malware campaign called GPUGate, which targets IT and software development companies. The attackers rely on malvertising via Google Ads to trick users searching for popular tools such as GitHub Desktop into downloading malicious files. A key feature of this campaign is the use of […]

ThaiCERT

September 10, 2025

“MostereRAT” Malware Stealthily Evades Detection and Disables Security Software

331/68 Wednesday, September 10, 2025 A new report from Fortinet has revealed a cyberattack campaign involving MostereRAT (Mostere Remote Access Trojan), a malware specifically designed to stealthily infiltrate and maintain long-term control over Windows systems. What makes MostereRAT stand out is its use of an uncommon programming language, its ability to disable security software, and […]

ThaiCERT

September 10, 2025

Data Leak in Salesloft Drift Traced to GitHub Breach and OAuth Token Theft

330/68 Tuesday, September 9, 2025 On August 28, 2025, cybersecurity firm Mandiant disclosed findings from its investigation into a data leak involving the Drift application. The probe revealed that hackers had compromised Salesloft’s GitHub account between March and June 2025, during which they downloaded data from private repositories, added guest users, and created new workflows. […]

ThaiCERT

September 9, 2025

Czech Republic Warns of Cyber Threats from China, Risks to Critical Infrastructure

329/68 Tuesday, September 9, 2025 The National Cyber and Information Security Agency of the Czech Republic (NUKIB) has issued a warning about cyber threats linked to China, highlighting that Chinese technologies and equipment are increasingly infiltrating critical sectors such as energy, healthcare, transportation, and government agencies. This poses a risk to national security, particularly through […]

ThaiCERT

September 9, 2025

Critical Vulnerability in SAP S/4HANA (CVE-2025-42957) Under Active Exploitation

328/68 Monday, September 8, 2025 Cybersecurity researchers have issued a warning regarding CVE-2025-42957, a vulnerability with a CVSS score of 9.9 in SAP S/4HANA, which has been confirmed to be actively exploited. The flaw is a command injection issue that allows attackers to inject ABAP code while bypassing authentication checks, enabling full control over SAP […]

ThaiCERT

September 8, 2025

VirusTotal Detects Phishing Campaign Hiding Malware in SVG Files

327/68 Monday, September 8, 2025 VirusTotal has identified a new phishing campaign that hides within SVG (Scalable Vector Graphics) files, embedding malware inside a fake portal that impersonates the Colombian judicial system. The attack was uncovered after VirusTotal enhanced its AI Code Insight platform to analyze SVG files, using machine learning to summarize suspicious behaviors […]

ThaiCERT

September 8, 2025

Android Security Alert: Google Patches 120 Vulnerabilities, Including Actively Exploited Zero-Days

326/68 Friday, September 5, 2025 Google has released the September 2025 Android security update, addressing a total of 120 vulnerabilities, including two zero-days currently under active exploitation: CVE-2025-38352 in the Linux Kernel and CVE-2025-48543 in the Android Runtime. Both flaws can be exploited for privilege escalation without requiring special permissions or user interaction. In addition […]

ThaiCERT

September 5, 2025

Hackers Exploit HexStrike AI to Breach New Vulnerabilities

325/68 Friday, September 5, 2025 Researchers from Check Point have revealed that HexStrike AI, a tool originally developed for red teaming and bug bounty purposes, is being misused by threat actors, turning it from a security testing utility into an automated attack engine. HexStrike AI can orchestrate more than 150 security utilities through AI agents, […]

ThaiCERT

September 5, 2025

Malicious Actors Exploit X’s Grok AI to Spread Harmful Links

324/68 Friday, September 5, 2025 Cybersecurity researchers at Guardio Labs have uncovered a new technique used by cybercriminals to abuse Grok, the AI assistant integrated into the X app (formerly Twitter), to bypass restrictions on posting malicious links. Malvertisers typically post enticing videos to lure victims but avoid embedding links directly in the posts to […]

ThaiCERT

September 5, 2025

Silver Fox Exploits Vulnerable WatchDog Driver in BYOVD Attack to Deploy ValleyRAT

323/68 Thursday, September 4, 2025 Cybersecurity company Check Point has revealed that the hacking group Silver Fox—also known as SwimSnake, The Great Thief of Valley, UTG-Q-1000, and Void Arachne—is using a Bring Your Own Vulnerable Driver (BYOVD) technique. The attackers leverage a Microsoft-signed but vulnerable driver from WatchDog Anti-malware (amsdk.sys version 1.0.600) to disable security […]

ThaiCERT

September 4, 2025
1 12 13 14 55