dongduongict@gmail.com

SecurityX Report : How AI Is Reinventing Cyber Threats

The AI-Forged Threat: An In-Depth Analysis of Cybersecurity Risks and Resilience in the Age of Artificial Intelligence Executive Summary The proliferation of Artificial Intelligence (AI) represents the most significant paradigm shift in cybersecurity since the advent of the internet. It is a profoundly dual-use technology, simultaneously offering unprecedented capabilities for cyber defense while arming adversaries […]

SecurityX Report : How AI Is Reinventing Cyber Threats Read More »

SecurityX Report: Securing the Office – From Employees to Infrastructure

🛡️ Securing the Office – From Employees to Infrastructure The Enterprise Cybersecurity Risk Landscape: A Comprehensive Threat Analysis and Mitigation Blueprint Executive Summary The contemporary enterprise operates within a digital ecosystem where the boundaries between internal and external threats have blurred, creating a complex and dynamic risk landscape. Cybersecurity is no longer a siloed IT

SecurityX Report: Securing the Office – From Employees to Infrastructure Read More »

SecurityX Report: Chrome Zero-Day Vulnerability CVE-2025-5419 Actively Exploited in the Wild

A newly discovered zero-day vulnerability in Google Chrome has prompted an out-of-band security update to protect users against active exploitation. The flaw, tracked as CVE-2025-5419, has been classified as high severity with a CVSS score of 8.8, and affects Chrome’s V8 JavaScript and WebAssembly engine. According to public vulnerability databases, the bug involves an out-of-bounds

SecurityX Report: Chrome Zero-Day Vulnerability CVE-2025-5419 Actively Exploited in the Wild Read More »

SecurityX Report: Malicious npm and PyPI Packages Reveal Deepening Threats in the Open-Source Supply Chain

Recent discoveries have exposed a growing wave of malware-laden open-source packages infiltrating popular repositories such as npm and PyPI, highlighting the increasing sophistication and stealth of supply chain attacks targeting developers, infrastructure, and cryptocurrency assets. 🛠️ Malicious npm Packages Conceal Multi-Stage Remote Access Tools Researchers identified several malicious npm packages, which were quickly removed after

SecurityX Report: Malicious npm and PyPI Packages Reveal Deepening Threats in the Open-Source Supply Chain Read More »

SecurityX Report : New PumaBot Botnet Hits Linux IoT Devices, Steals SSH Credentials and Mines Crypto

PumaBot Botnet Targets Linux IoT Devices with SSH Brute-Force and Crypto Mining A newly identified botnet named PumaBot is actively targeting embedded Linux-based IoT devices, leveraging Go-based malware to perform SSH brute-force attacks, establish persistence, and deploy crypto-mining operations across infected systems. Unlike traditional botnets that scan the internet randomly, PumaBot retrieves a pre-compiled list

SecurityX Report : New PumaBot Botnet Hits Linux IoT Devices, Steals SSH Credentials and Mines Crypto Read More »

SecurityX Report: Help Desk Scams Fuel Scattered Spider’s Identity-Based Attack Campaigns

Following disruptive attacks on major UK retailers including Marks & Spencer and Co-op, the threat actor Scattered Spider has once again drawn attention for its evolving use of help desk social engineering to bypass authentication and take over high-privilege accounts—leading to data theft, ransomware deployment, and significant financial damage. Estimates suggest that Marks & Spencer

SecurityX Report: Help Desk Scams Fuel Scattered Spider’s Identity-Based Attack Campaigns Read More »

SecurityX Report: APT41 Abuses Google Calendar for Covert Malware Command-and-Control

A newly documented cyber-espionage campaign has revealed how the state-sponsored group APT41 leveraged Google Calendar as a covert channel for command-and-control (C2) communications in its latest attacks targeting government entities. Discovered in late October 2024, the operation involved a custom malware strain known as TOUGHPROGRESS, which was found hosted on a compromised government website. The

SecurityX Report: APT41 Abuses Google Calendar for Covert Malware Command-and-Control Read More »

SecurityX Report: Race Condition Flaws in Apport and systemd-coredump Expose Sensitive Data on Major Linux Distributions

Two newly disclosed vulnerabilities affecting Linux crash-handling utilities—Apport and systemd-coredump—pose a risk of sensitive data leakage on systems running Ubuntu, Red Hat Enterprise Linux, Fedora, and potentially others. The flaws, stemming from race conditions, may allow local attackers to extract contents of core dumps generated by privileged SUID processes. The issues are tracked as: 🛠

SecurityX Report: Race Condition Flaws in Apport and systemd-coredump Expose Sensitive Data on Major Linux Distributions Read More »

SecurityX Report: Discord Vanity Link Hijacking Delivers AsyncRAT and Skuld Stealer in New Malware Campaign

A newly uncovered malware campaign has demonstrated how threat actors are abusing Discord’s vanity invite system to silently redirect users to malicious servers, ultimately delivering AsyncRAT and a customized Skuld information stealer. At the core of the campaign is a flaw in Discord’s invite mechanism that allows attackers to reuse expired or deleted invite codes

SecurityX Report: Discord Vanity Link Hijacking Delivers AsyncRAT and Skuld Stealer in New Malware Campaign Read More »

SecurityX Report: VexTrio’s Expanding TDS Empire Links to Help TDS and Disposable TDS in Global Malware Campaigns

A sprawling web of malicious advertising infrastructure tied to the threat actor group behind VexTrio Viper Traffic Distribution Service (TDS) has been linked to at least two additional traffic distribution operations—Help TDS and Disposable TDS—according to recent threat intelligence research. These interconnected services form a sophisticated affiliate-driven ecosystem designed to redirect unsuspecting users to malware,

SecurityX Report: VexTrio’s Expanding TDS Empire Links to Help TDS and Disposable TDS in Global Malware Campaigns Read More »