🟡 CVE-2025-6097: A vulnerability was found in U... 🟡 CVE-2025-6096: A vulnerability has been found... 🟡 CVE-2025-6095: A vulnerability, which was cla... 🟡 CVE-2025-6094: A vulnerability, which was cla... 🟡 CVE-2025-6093: A vulnerability classified as ... ⚠️ CVE-2025-5964: A path traversal issue in the ... 🟡 CVE-2025-6092: A vulnerability was found in c... ⚠️ CVE-2025-5990: An input neutralization vulner... ⚠️ CVE-2025-6091: A vulnerability was found in H... 🟡 CVE-2024-25573: Unsanitized user-supplied data... ⚠️ CVE-2025-6090: A vulnerability was found in H... 🟡 CVE-2025-22854: Improper handling of non-200 h... 🟢 CVE-2025-21085: PingFederate OAuth2 grant dupl... 🟡 CVE-2025-6089: A vulnerability has been found... 🟡 CVE-2025-36041: IBM MQ Operator LTS 2.0.0 thro... ⚠️ CVE-2025-1411: IBM Security Verify Directory ... 🟡 CVE-2025-5337: The Slider, Gallery, and Carou... 🟡 CVE-2025-5238: The YITH WooCommerce Wishlist ... 🟡 CVE-2025-4667: The Appointment Booking Calend... 🟡 CVE-2025-6070: The Restrict File Access plugi... 🔥 CVE-2025-6065: The Image Resizer On The Fly p... 🟡 CVE-2025-6064: The WP URL Shortener plugin fo... 🟡 CVE-2025-6063: The XiSearch bar plugin for Wo... 🟡 CVE-2025-6062: The Yougler Blogger Profile Pa... 🟡 CVE-2025-6061: The kk Youtube Video plugin fo... 🟡 CVE-2025-6055: The Zen Sticky Social plugin f... 🟡 CVE-2025-6040: The Easy Flashcards plugin for... 🟡 CVE-2025-5589: The StreamWeasels Kick Integra... 🟡 CVE-2025-5336: The Click to Chat plugin for W... 🟡 CVE-2025-4592: The AI Image Lab – Free AI Ima... 🟡 CVE-2025-4216: The DIOT SCADA with MQTT plugi... ⚠️ CVE-2025-4200: The Zagg - Electronics & Acces... 🟡 CVE-2025-4187: The UserPro - Community and Us... ⚠️ CVE-2025-5487: The AutomatorWP – Automator pl... ⚠️ CVE-2025-3234: The File Manager Pro – Fileste... 🟡 CVE-2025-6059: The Seraphinite Accelerator pl... ⚠️ CVE-2025-33108: IBM Backup, Recovery and Media... ⚠️ CVE-2025-25215: An arbitrary free vulnerabilit... ⚠️ CVE-2025-24919: A deserialization of untrusted... 🟡 CVE-2025-6083: In ExtremeCloud Universal ZTNA... 🟡 CVE-2025-49598: conda-forge-ci-setup is a pack... ⚠️ CVE-2025-25050: An out-of-bounds write vulnera... ⚠️ CVE-2025-24922: A stack-based buffer overflow ... ⚠️ CVE-2025-24311: An out-of-bounds read vulnerab... 🟢 CVE-2025-49597: handcraftedinthealps goodby-cs... 🔥 CVE-2025-49596: The MCP inspector is a develop... 🟡 CVE-2025-49587: XWiki is an open-source wiki s... ⚠️ CVE-2025-49586: XWiki is an open-source wiki s... ⚠️ CVE-2025-49585: XWiki is a generic wiki platfo... ⚠️ CVE-2025-49584: XWiki is a generic wiki platfo... 🟡 CVE-2025-49583: XWiki is a generic wiki platfo... ⚠️ CVE-2025-49582: XWiki is a generic wiki platfo... 🟢 CVE-2025-6052: A flaw was found in how GLib’s... 🟡 CVE-2025-6035: A flaw was found in GIMP. An i... ⚠️ CVE-2025-49581: XWiki is a generic wiki platfo... ⚠️ CVE-2025-49580: XWiki is a generic wiki platfo... ⚠️ CVE-2025-48920: Improper Neutralization of Inp... 🟡 CVE-2025-48919: Improper Neutralization of Inp... ⚠️ CVE-2025-48918: Improper Neutralization of Inp... 🟡 CVE-2025-48917: Improper Neutralization of Inp... 🟡 CVE-2025-48916: Missing Authorization vulnerab... ⚠️ CVE-2025-48915: Improper Neutralization of Inp... ⚠️ CVE-2025-48914: Improper Neutralization of Inp... 🔥 CVE-2025-6030: Use of fixed learning codes, o... 🔥 CVE-2025-6029: Use of fixed learning codes, o... ⚠️ CVE-2025-36633: In Tenable Agent versions prio... ⚠️ CVE-2025-36631: In Tenable Agent versions prio... 🔥 CVE-2025-28389: Weak password requirements in ... 🔥 CVE-2025-28388: OpenC3 COSMOS v6.0.0 was disco... 🔥 CVE-2025-28384: An issue in the /script-api/sc... ⚠️ CVE-2025-28382: An issue in the openc3-api/tab... ⚠️ CVE-2025-28381: A credential leak in OpenC3 CO... 🟡 CVE-2025-46096: Directory Traversal vulnerabil... 🔥 CVE-2025-46060: Buffer Overflow vulnerability ... ⚠️ CVE-2025-49468: A SQL injection vulnerability ... 🔥 CVE-2025-29902: Remote code execution that all... 🟢 CVE-2025-48825: RICOH Streamline NX V3 PC Clie... 🔥 CVE-2025-46783: Path traversal vulnerability e... 🟡 CVE-2025-36506: External control of file name ... 🟡 CVE-2025-6012: The Auto Attachments plugin fo... ⚠️ CVE-2025-39240: Some Hikvision Wireless Access... 🔥 CVE-2024-38824: Directory traversal vulnerabil... 🟡 CVE-2025-5923: The Game Review Block plugin f... 🟡 CVE-2025-22242: Worker process denial of servi... 🟡 CVE-2025-22241: File contents overwrite the Vi... 🟡 CVE-2025-22240: Arbitrary directory creation o... ⚠️ CVE-2025-22239: Arbitrary event injection on S... 🟡 CVE-2025-22238: Directory traversal attack in ... 🟡 CVE-2025-22237: An attacker with access to a m... ⚠️ CVE-2025-22236: Minion event bus authorization... 🟡 CVE-2024-38825: The salt.auth.pki module does ... 🟢 CVE-2024-38823: Salt's request server is vulne... 🟢 CVE-2024-38822: Multiple methods in the salt m... 🟡 CVE-2025-4229: An information disclosure vuln... 🟢 CVE-2025-4227: An improper access control vul... 🟡 CVE-2025-5815: The Traffic Monitor plugin for... ⚠️ CVE-2025-5282: The WP Travel Engine – Tour Bo... 🟡 CVE-2025-5950: The IndieBlocks plugin for Wor... 🟡 CVE-2025-5939: The Telegram for WP plugin for... 🟡 CVE-2025-5938: The Digital Marketing and Agen...
Understanding Modern Cyber Threats: From ToxicEye to FrigidStealer

Welcome to the evolving world of cybersecurity, where the arms race between cyber defenders and cybercriminals continues to escalate. In this blog post, we will delve into several sophisticated cyber threats that have emerged recently, including the ToxicEye malware, the FrigidStealer targeting MacOS, and increased phishing campaigns by Iranian-backed groups. Our aim is to demystify these threats and provide actionable advice to enhance your cybersecurity posture.

The Rise of ToxicEye

Reported on by Packet Storm, the malware known as ToxicEye is leveraging the popular Telegram app to conduct its nefarious activities. This malware is a type of Remote Access Trojan (RAT) that takes control of a victim's system. By embedding its command and control communication mechanisms within Telegram, ToxicEye can bypass traditional security measures undetected. This represents a shift in how attackers are exploiting trusted applications to distribute malware.

New Threats on MacOS: FrigidStealer

As reported by SecurityBrief, the FrigidStealer malware is a new player targeting MacOS users. This malware is particularly dangerous because it focuses on stealing sensitive information, such as credentials and financial data. The emergence of groups like TA2726 and TA2727, who specialize in these attacks, indicates a growing trend towards targeting previously less-attacked platforms like MacOS.

Increased Phishing Efforts by Iranian Groups

An update from Packet Storm highlights increased phishing campaigns by an Iranian-backed group known as APT42. These campaigns are sophisticated, involving various tactics such as hosting malicious pages and malware delivery via email. The geopolitical implications of such campaigns are significant, affecting national security on multiple fronts.

The Return of Dridex and Locky

According to a report from Malware News, the notable malware families Dridex and Locky have resurfaced, this time being spread through PDF attachments in spam emails. These types of malware are notorious for their ability to siphon financial information and execute ransomware attacks, and their resurgence is a crucial reminder of the need for constant vigilance in email security.

Conclusion and Protective Measures

The landscape of cyber threats is continually changing, with attackers always looking for new methods to exploit and new vulnerabilities to target. Awareness and education are key components of a robust defense strategy. Employ strong antimalware tools, keep your systems updated, and be vigilant about unsolicited emails and attachments. Regularly back up your data, and consider using multi-factor authentication to add an extra layer of security.

Back to Posts
// This is the updated banner script block with corrected ID selectors