Daily Breach

Vulnerability

Cryptominers and Reverse Shells Widely Deployed in Ongoing React2Shell Exploitation

What’s Happening Once exploited, attackers frequently deploy the XMRig cryptocurrency miner and establish reverse shells — giving hands-on access to compromised systems. Over 1.4 million exploitation attempts targeting React2Shell were observed in the past week by GreyNoise threat intelligence. Two malicious IP addresses alone accounted for the majority of these attempts, with nearly 35% tied […]

Data Breaches

Trusted Clouds, Malicious Intent: Hackers Weaponize Azure, Google Cloud, and AWS for Advanced Phishing Campaigns

Introduction Cybersecurity researchers are observing a significant shift in phishing operations, where threat actors are increasingly abusing legitimate cloud and content delivery network platforms to host phishing infrastructure. By leveraging trusted services from major providers, attackers are effectively evading traditional detection mechanisms and exploiting implicit trust within enterprise security architectures. Background and Context Historically, phishing […]

Data Breaches

ClickFix Exposed: How Copy/Paste Attacks Are Fueling a New Wave of Security Breaches

The Rise of ClickFix and Browser-Based Attacks A new form of cyber threat — commonly known as ClickFix or FileFix — is rapidly gaining traction among cybercriminals and state-sponsored actors. These browser-based copy/paste attacks are emerging as a leading cause of modern security breaches, targeting unsuspecting users through malicious scripts disguised as legitimate online interactions. […]