exploitation

Tech Optimizer
April 12, 2026
Support for OrientDB in Sonatype Nexus Repository has been discontinued, and older versions of Nexus Repository (prior to 3.70.5) are built on an outdated architecture that presents high-severity vulnerabilities and cannot be fully patched. The recommended database for Nexus Repository is now PostgreSQL, which offers better performance and support for modern architectures. Users have two migration options: transition to Sonatype Nexus Repository Cloud, which is fully managed and eliminates database management, or migrate to PostgreSQL while maintaining a self-hosted environment, which requires ongoing maintenance and infrastructure ownership.
Winsage
April 7, 2026
A security researcher, known as "Nightmare-Eclipse," released proof-of-concept exploit code for a Windows zero-day vulnerability called "BlueHammer," which allows local privilege escalation (LPE). The exploit has been validated by another researcher, Will Dormann, who confirmed it can escalate privileges on Windows systems, allowing non-administrative users to gain SYSTEM-level access. The exploit's reliability varies across different Windows versions, with inconsistent success rates reported. Microsoft has not acknowledged the vulnerability or provided a patch, raising concerns about potential exploitation by threat actors. Users are advised to restrict local user access, monitor for suspicious activity, and enable advanced endpoint protection.
AppWizard
April 3, 2026
Fraudsters are exploiting in-game chats in Minecraft to deceive young players, particularly in Russia. They initiate contact with children in the game, then move the conversation to Telegram, posing as "cybersecurity officers" and claiming that the children have shared sensitive information. They threaten detention to coerce minors into stealing money from their parents to give to couriers. Authorities have issued warnings to raise awareness among children and parents about these deceptive tactics.
Tech Optimizer
March 19, 2026
The ransomware group LeakNet has evolved its tactics, increasing its average targets from three per month and shifting from purchasing stolen network access to launching its own campaigns. They now use deceptive error screens and a new tool that executes malicious code in a computer's memory. Their strategy includes ClickFix lures, which compromise legitimate websites to display fake security checks, tricking users into executing malicious commands. This method broadens their victim reach and reduces costs. The Deno loader, part of this strategy, collects machine information and retrieves additional malicious code without leaving standard files, making detection difficult. After infiltrating a network, LeakNet checks for active user credentials and uses PsExec for lateral movement, employing Amazon S3 buckets for payload staging and data exfiltration. Defenders are advised to monitor for suspicious behavior rather than just known malicious files, focusing on unusual web commands and unexpected cloud storage connections.
AppWizard
March 19, 2026
Cybersecurity researchers have identified a new family of Android malware called Perseus, designed for device takeovers and financial fraud. It utilizes Accessibility-based remote sessions for real-time monitoring and interaction with infected devices, particularly targeting Turkey and Italy. Perseus monitors user notes to extract personal or financial information and is distributed through dropper applications via phishing websites. It expands on the codebase of previous malware like Phoenix and employs disguises as IPTV services to reduce user suspicion. Once operational, it performs overlay attacks and captures keystrokes to steal credentials from financial applications. The malware allows operators to issue commands through a command-and-control panel, enabling various malicious actions, including capturing note content and initiating remote visual streams. Perseus also conducts environment checks to evade detection and ensure it operates on legitimate devices.
Search