VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

darkreading
Insight Partners Data Breach: Bigger Impact Than Anticipated

The ongoing investigation into the Insight Partners data breach reveals a more significant impact than initially anticipated, prompting the VC firm to inform affected customers progressively as details emerge. This situation underscores the importance of transparency and timely communication in the wake of cybersecurity incidents.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: Vendor advisory pending

Data Breach

Published:

The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation

A joint operation by Dutch and U.S. law enforcement has successfully dismantled a large proxy botnet consisting of 7,000 infected IoT and end-of-life devices. This significant action highlights the ongoing threat posed by such networks in providing anonymity to malicious actors.


Impact: ["IoT devices", "end-of-life (EoL) systems"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors have been enhancing their cross-platform malware, OtterCookie, to include features for stealing credentials from web browsers and other files. This ongoing development of OtterCookie, particularly versions v3 and v4, poses significant risks to users' sensitive information and highlights the evolving tactics of cybercriminals.


Impact: ["Web browsers", "Chrome", "MetaMask"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Update software

Malware

Published:

SecurityWeek
In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak

The article highlights a surge in cyberattacks between India and Pakistan, alongside vulnerabilities found in Radware's cloud WAF and a key leak from xAI. These incidents underscore the increasing cyber tensions in the region and the potential risks posed by the identified vulnerabilities.


Impact: ["Radware cloud WAF", "xAI"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: See source

Published:

SecurityWeek
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

The rand-user-agent NPM package, a popular tool for web scraping, has been compromised in a supply chain attack, leading to the deployment and activation of a backdoor. This incident highlights the vulnerabilities associated with third-party packages in software development and the potential risks they pose to users.


Impact: ["rand-user-agent NPM package"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update software

Published:

darkreading
How Security Has Changed the Hacker Marketplace

The article emphasizes that organizations should focus on making exploitation unprofitable rather than achieving perfect security. This shift in mindset is crucial as it reflects the evolving hacker marketplace where security measures must adapt to deter attackers effectively.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
160,000 Impacted by Valsoft Data Breach

Valsoft Corporation has reported a data breach that has compromised the personal information of over 160,000 individuals. This incident underscores the ongoing challenges organizations face in safeguarding sensitive data and the potential impacts on affected individuals.


Impact: Not specified

In the Wild: Unknown

Age: Discovered in February 2025

Remediation: None available

Data Breach

Published:

SecurityWeek
Malicious NPM Packages Target Cursor AI’s macOS Users

Three malicious NPM packages masquerading as developer tools for the macOS version of Cursor AI have been discovered to contain a backdoor. This poses a significant security risk to users of the Cursor AI code editor on macOS, potentially compromising their systems.


Impact: ["Cursor AI", "macOS"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Users should remove the malicious packages and ensure their systems are secure.

macOS Malware

Published:

SecurityWeek
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits

Kelley Misata, founder of Sightline Security, emphasizes the need for tailored cybersecurity solutions for nonprofits, highlighting their unique missions and vulnerabilities. She urges vendors to pay attention to these specific needs to enhance the overall security posture of the nonprofit sector.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

The Hacker News
Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

A new cybersecurity campaign is targeting Brazilian executives through spam messages that exploit the NF-e electronic invoice system, encouraging users to download malicious remote monitoring and management (RMM) software. This tactic has been active since January 2025, highlighting the ongoing threat posed by initial access brokers in the region.


Impact: ["Remote Monitoring and Management (RMM) software", "Brazilian electronic invoice system (NF-e)"]

In the Wild: Yes

Age: Discovered in January 2025

Remediation: Users are advised to avoid clicking on suspicious links and to verify the authenticity of messages before downloading any software.

Phishing Cisco

Published:

The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

AI agents are transforming business operations by automating tasks and enhancing user experiences, but they also introduce significant security risks such as data leaks and identity theft. Companies utilizing AI agents must prioritize their security to prevent malicious misuse and protect sensitive data.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: Implement security measures for AI agents

Published:

The Hacker News
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

Researchers have identified three malicious npm packages targeting Cursor, an AI-powered source code editor for macOS, that are designed to steal user credentials and download additional malicious payloads. This incident highlights the risks associated with third-party software dependencies and the potential for credential theft.


Impact: ["Cursor", "macOS"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Remove the malicious packages and monitor for suspicious activity.

macOS Apple Malware Threat Actor

Published:

SecurityWeek
SAP Zero-Day Targeted Since January, Many Sectors Impacted

A zero-day vulnerability in SAP NetWeaver has been actively targeted for remote code execution since January 2025, impacting multiple sectors. The significance of this vulnerability lies in its potential to compromise critical business operations across various industries.


Impact: ["SAP NetWeaver"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Zero-day

Published:

SecurityWeek
Company and Personal Data Compromised in Recent Insight Partners Hack

Insight Partners has reported a cyberattack that compromised the personal and company data of its partners and employees. This incident highlights ongoing vulnerabilities within organizations and the need for robust cybersecurity measures.


Impact: Not specified

In the Wild: Unknown

Age: Discovered in January 2025

Remediation: None available

Data Breach

Published:

The Hacker News
Beyond Vulnerability Management – Can You CVE What I CVE?

The article discusses the challenges of vulnerability management, highlighting the overwhelming number of unique security issues that strain security teams. With over 1.3 million findings identified, the reactive approach to managing vulnerabilities is proving inadequate, emphasizing the need for more proactive strategies.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

CVE Vulnerability

Published: