Hidden Malware on WordPress Websites: Threats and Protection Measures

Cybersecurity researchers have discovered a sophisticated malware campaign targeting WordPress websites. This campaign uses the installation of a backdoor, allowing hackers to execute remote code. The malware spreads through the mu-plugins directory, giving attackers full system compromise, data theft, and…

New Go-Based Malware Controlled via Telegram Identified

Cybersecurity researchers have discovered a new malware (backdoor) written in the Go programming language. This malicious software uses the Telegram messenger as a command and control (C2) channel. Although still under development, it is already fully functional and capable of…

RedMike Hackers Breached 1000+ Cisco Devices and Gained Admin Access

Recent cybersecurity research has revealed that the Chinese state-backed hacker group “Salt Typhoon” (also known as “RedMike”) compromised more than 1,000 vulnerable Cisco devices worldwide between December 2024 and January 2025, exploiting them for their operations. This cyber-espionage campaign primarily…

PostgreSQL Terminal Tool Vulnerability Allows Remote Code Execution

Recently, cybersecurity researchers discovered a critical SQL injection vulnerability in PostgreSQL’s interactive terminal tool, psql. This vulnerability, identified as CVE-2025-1094, allows attackers to remotely execute arbitrary code. This flaw was uncovered during the analysis of CVE-2024-12356, a remote code execution…

SonicWall Firewall Vulnerability Allows Attackers to Hijack SSL VPN Sessions

Recently, cybersecurity experts have discovered a critical vulnerability in SonicWall firewalls. The vulnerability, identified as CVE-2024-53704, allows attackers to hijack SSL VPN sessions and gain unauthorized access. This vulnerability affects SonicOS versions 7.1.x (7.1.1-7058 and earlier), 7.1.2-7019, and 8.0.0-8035. Attackers…

Skip to content