Content Paint

Vault 33 | Cyber News & Intel

Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.

News  | May 02, 2025
/
Colorful digital lock surrounded by circuit patterns, symbolizing data security and encryption in cybersecurity.
News  | May 02, 2025
/
Cybersecurity cityscape with neon data visualizations, depicting network security, encryption, and cyber threats.
Intel  | May 02, 2025
/
Futuristic data center with glowing circuits and digital displays, symbolizing cybersecurity technology and data protection.
Intel  | Apr 29, 2025
/
Digital lock guardian made of a circuit board in a vibrant cityscape, symbolizing data security and cybersecurity measures against attacks.
Intel  | Apr 29, 2025
/
Digital lock on a circuit board in a vibrant cityscape, symbolizing data security and cybersecurity measures against attacks.
News  | Apr 29, 2025
/
Digital cybersecurity landscape featuring vibrant data streams and security icons, highlighting malware threats and defenses.

Read Our Latest Posts

Latest Posts

386 Posts
Ongoing Phishing Campaign Exploits Google Calendar to Evade Spam Filters

Phishing attacks are evolving as cybercriminals find creative ways to infiltrate user inboxes. A recent campaign is exploiting Google Calendar invites and Google Drawings to deceitfully harvest user credentials while evading spam detection. Platform Abuse The tactic leverages Google Calendar invites, cleverly embedding phishing links within event descriptions or attachments.

Russia-Linked APT29 Utilizes Red Team Tools in Rogue RDP Cyberattacks

The Russia-linked cyber espionage unit APT29—known by various aliases including Cozy Bear and Nobelium—has adapted red teaming tactics to perpetrate rogue RDP attacks. This campaign, primarily targeting governmental and academic sectors, marks a sophisticated step in the group's cyber activities. Cyber Group Identity APT29, also recognized

Malicious Microsoft VSCode Extensions Target Developers and Cryptocurrency Users

Recent discoveries have revealed a series of harmful Visual Studio Code (VSCode) extensions infiltrating the VSCode marketplace, designed to unleash heavily disguised PowerShell payloads. These attacks focus on software developers and the cryptocurrency sector, posing a significant risk through supply chain vulnerabilities. Timeline and Discovery According to a report by

HubSpot Phishing Attack Steals Azure Credentials from Manufacturers

In a recent phishing campaign, 20,000 employees from European manufacturing firms have found themselves in the crosshairs of cybercriminals. This attack, which spanned from June to at least September, primarily affected automotive, chemical, and industrial compound companies in the UK, France, and Germany, according to research by Palo Alto

FBI Alerts Public to HiatusRAT Scans Targeting Chinese-Made Web Cameras and DVR Systems

The FBI has issued a warning regarding a new surge of HiatusRAT malware targeting internet-connected surveillance cameras and DVRs from Chinese brands. The alert, shared through a Private Industry Notification, outlines ongoing scanning campaigns exploiting these vulnerabilities. Emergence and Persistence HiatusRAT, which has been active since July 2022, gained traction

TA397 Malware Campaign Targets Turkish Defense Sector with Sophisticated Tactics

Security analysts have exposed a sophisticated phishing operation targeting an organization in Turkey's defense sector, showcasing the evolving strategies of the threat actor TA397, also known as "Bitter." Phishing Campaign Breakdown According to research by Proofpoint, the campaign utilized spear phishing techniques through emails containing RAR

Attackers Leverage Microsoft Teams and AnyDesk to Spread DarkGate Malware

A recently identified social engineering scheme has taken advantage of Microsoft Teams to distribute the notorious DarkGate malware. Researchers at Trend Micro, including Catherine Loveria, Jovit Samaniego, and Gabriel Nicoleta, revealed how attackers impersonate clients via Teams calls to gain unauthorized access to victims' systems. During these attacks, threat

Hackers Demand Ransom After Rhode Island Health System Data Breach

A significant cyber breach has hit the Rhode Island Benefits System (RIBridges), affecting various health and social service programs. The attackers, identified as an international cybercriminal syndicate, are now demanding a ransom, threatening to expose sensitive personal information of numerous residents. The Breach Details Discovery: On December 5, cybersecurity officials

Critical Apache Struts Vulnerability Exploited to Identify Exposed Servers

A serious security flaw in Apache Struts 2, identified as CVE-2024-53677, is currently being exploited by attackers using public proof-of-concept exploits to locate susceptible devices. Apache Struts is a widely used open-source framework for Java-based web applications, utilized by industries such as government, finance, e-commerce, and aviation. Vulnerability Details The

Browse by Tags

4 Tags
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.