



🚨 Hackers are abusing SourceForge to spread crypto miners & clipper malware disguised as Microsoft Office downloads. ➡️ 4,600+ users hit (Jan–Mar 2025) ➡️ 90% victims = Russian speakers ➡️ Attack chain uses Telegram API, fake URLs & Google Ads 🔗 Read: https://t.co/S95Z1107YI
Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube: https://t.co/Um48XUpsBB by darkreading #infosec #cybersecurity #technology #news
Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk https://t.co/DWR3Bd5u2n

A newly discovered remote code execution vulnerability in the Ivanti Connect Secure VPN platform, designated CVE-2025-22457, is being actively exploited by Chinese threat actors. The vulnerability allows for unauthenticated remote code execution and has been observed in over 5,113 unpatched instances as of April 6, 2025. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known Exploited Vulnerabilities catalog. Additionally, the group UNC5221 has exploited multiple vulnerabilities in Ivanti products since 2023. Other cybersecurity threats include the resurgence of Fast Flux networks, which are being utilized by hackers like Gamaredon and Raspberry Robin to evade detection and launch malware attacks. CISA, NSA, and the FBI have issued warnings regarding these threats, advising organizations to implement measures such as blocking and monitoring to mitigate risks. Furthermore, malicious Microsoft Visual Studio Code extensions have been linked to cryptojacking campaigns, and a new malware called GIFTEDCROOK is targeting Ukrainian entities through phishing emails.