Blog
- Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities May 27, 2025The Federal Bureau of Investigation (FBI) released this FBI Liaison Alert System (FLASH) to disseminate indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with 5Socks and Anyproxy cyber criminal services’ targeting malware that affects end-of-life (EOL) routers. Threat actors exploit known vulnerabilities to compromise EOL routers, install malware, and use the routers in a botnet […]blogmirnet
- The Latest Wave of GuLoader Campaigns May 27, 2025Since 2019, GuLoader has been active as a downloader, spreading through spam campaigns with malicious attachments. To evade detection, it downloads encrypted payloads typically from genuine file-sharing websites, such as Google Drive or Microsoft OneDrive. Once installed, the malware attempts to establish persistence by modifying system settings, creating registry entries, and adding itself to startup […]blogmirnet
- Uptick in Employment Scams May 27, 2025The NJCCIC observed an uptick in employment scams that target and exploit individuals seeking employment. Threat actors first perform reconnaissance on their targets, gathering information from various sources, such as past data breaches, publicly disclosed data, social media profiles, and data purchased on the dark web. They communicate with their targets via emails, text messages, WhatsApp, […]blogmirnet
- Critical Patches Issued for Microsoft Products, May 13, 2025 – PATCH NOW May 27, 2025Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]blogmirnet
- Multiple Vulnerabilities in Fortinet ProductsCould Allow for Arbitrary Code Execution May 27, 2025This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals. Multiple vulnerabilities have been discovered in Fortinet Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could […]blogmirnet
- Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution – PATCH NOW May 27, 2025Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager Mobile (EPMM) is a unified endpoint management solution that enables organizations to securely manage and monitor mobile devices, applications, and content across multiple platforms from a centralized interface. Successful exploitation of […]blogmirnet
- A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution – PATCH NOW May 27, 2025A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create […]blogmirnet
- Russian GRU Targeting Western Logistics Entities and Technology Companies May 27, 2025This Joint Cybersecurity Advisory highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This campaign includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and technology companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate […]blogmirnet
- Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations May 27, 2025The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this Joint Cybersecurity Advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate […]blogmirnet
- China’s Cyber Strategy Targets US Infrastructure May 27, 2025To view and download a PDF of this report, click here. I. Executive Summary China is engaging in sustained cyber operations targeting US critical infrastructure to lay the foundation for future disruption of key lifeline services. Advanced persistent threat (APT) groups like Volt Typhoon, APT41, and Salt Typhoon are spearheading this activity and have demonstrated sophisticated capabilities […]blogmirnet