Topic: reverse shell

  • Russian Hackers Hide Malware in Linux VMs Using Hyper-V

    Russian Hackers Hide Malware in Linux VMs Using Hyper-V

    The Russian cyber-espionage group Curly COMrades uses Microsoft's Hyper-V to hide malware in concealed Linux virtual machines, evading standard security measures and targeting entities aligned with Russian interests. Attackers deploy a minimal Alpine Linux VM hosting custom tools like CurlyShell ...

    Read More »
  • SonicWall SMA 100 Series Now Fights Rootkits

    SonicWall SMA 100 Series Now Fights Rootkits

    SonicWall has released a critical firmware update for its SMA 100 series to scan for and remove the OVERSTEP rootkit, patching vulnerabilities like CVE-2024-38475 in response to a sophisticated attack by threat group UNC6148. The attack involved using stolen credentials to gain unauthorized acces...

    Read More »
  • 60,000 Redis Servers Exposed by Critical Security Flaw

    60,000 Redis Servers Exposed by Critical Security Flaw

    A critical vulnerability (CVE-2025-49844) in Redis, rated 10.0 in severity, allows attackers to gain full control over servers by exploiting a flaw in the Lua scripting engine that has existed for 13 years. Approximately 60,000 publicly accessible Redis servers with no authentication are at direc...

    Read More »
  • Leaked Oracle EBS Exploit Fuels New Attack Wave (CVE-2025-61882)

    Leaked Oracle EBS Exploit Fuels New Attack Wave (CVE-2025-61882)

    A critical vulnerability chain in Oracle's E-Business Suite (CVE-2025-61882) is being actively exploited following the public leak of functional exploit scripts, enabling complete system compromise. The attack uses obfuscated HTTP requests to perform server-side request forgery, tricking the serv...

    Read More »
  • Oracle Fixes Zero-Day Exploited in Clop Ransomware Attacks

    Oracle Fixes Zero-Day Exploited in Clop Ransomware Attacks

    Oracle has issued an urgent alert for a critical zero-day vulnerability (CVE-2025-61882) in its E-Business Suite, allowing unauthenticated remote code execution and actively exploited by the Clop ransomware group for data theft. The vulnerability affects versions 12.2.3 to 12.2.14, with Oracle re...

    Read More »