CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile
CyberXTron Technologies

@cyberxtrontech

This is the official account of CyberXTron Technologies, an award-winning Cyber Security Company with a mission of helping organizations mitigate cyber attacks!

ID: 1719006985428029440

linkhttps://cyberxtron.com/ calendar_today30-10-2023 15:03:26

1,1K Tweet

309 Takipçi

42 Takip Edilen

CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨 Threat Campaign: Fog Ransomware Targets Asian Financial Institution with Blend of Legitimate Monitoring Software and Open-Source Tools Including Syteca and GC2 🚨 Summary: In May 2025, a ransomware attack on an Asian financial institution involved Fog ransomware and an

🚨 Threat Campaign: Fog Ransomware Targets Asian Financial Institution with Blend of Legitimate Monitoring Software and Open-Source Tools Including Syteca and GC2 🚨

Summary: In May 2025, a ransomware attack on an Asian financial institution involved Fog ransomware and an
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨CVE Alert: PaperCut MF/NG Remote code execution vulnerability via CSRF Exploited In The Wild🚨 Vulnerability Details: CVE-2023-2533(8.4/10) PaperCut MF/NG Remote code execution vulnerability Impact: A successful exploit may allow an attacker to perform unauthorized actions

🚨CVE Alert: PaperCut MF/NG Remote code execution vulnerability via CSRF Exploited In The Wild🚨 

Vulnerability Details: CVE-2023-2533(8.4/10) PaperCut MF/NG Remote code execution vulnerability

Impact: A successful exploit may allow an attacker to perform unauthorized actions
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Stealthy VIP Keylogger Attack Uses AutoIt and Process Hollowing to Steal Browser Credentials via Phishing Emails🚨 Summary: A spear-phishing campaign is deploying the VIP Keylogger using an AutoIt-based injector and process hollowing to evade detection.

🚨Threat Campaign Alert: Stealthy VIP Keylogger Attack Uses AutoIt and Process Hollowing to Steal Browser Credentials via Phishing Emails🚨

Summary: A spear-phishing campaign is deploying the VIP Keylogger using an AutoIt-based injector and process hollowing to evade detection.
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🔒CyberXTron Monthly Newsletter🔒 Access our Monthly Cyber News Letter for July 2025. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs. Report Link: lnkd.in/gzQT6jsU

🔒CyberXTron Monthly Newsletter🔒

Access our Monthly Cyber News Letter for July 2025. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs.

Report Link: lnkd.in/gzQT6jsU
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: APT36 Targeting Indian Government and Critical Infrastructure Using Poseidon Malware and Sophisticated Phishing Operations🚨 Summary: APT36, a Pakistan-based threat group, has escalated attacks on Indian government entities, railways, and oil & gas

🚨Threat Campaign Alert: APT36 Targeting Indian Government and Critical Infrastructure Using Poseidon Malware and Sophisticated Phishing Operations🚨

Summary: APT36, a Pakistan-based threat group, has escalated attacks on Indian government entities, railways, and oil & gas
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨CVE Alert: Alone – Charity WordPress Theme Missing Authorization Flaw Enables Unauthenticated File Upload Vulnerability Exploited in the Wild🚨 Vulnerability Details: CVE-2025-5394(CVSS 9.8/10) Alone – Charity WordPress Theme Missing Authorization Flaw Enables

🚨CVE Alert:  Alone – Charity WordPress Theme Missing Authorization Flaw Enables Unauthenticated File Upload Vulnerability Exploited in the Wild🚨 

Vulnerability Details: CVE-2025-5394(CVSS 9.8/10) Alone – Charity WordPress Theme Missing Authorization Flaw Enables
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨CVE Alert: D-Link DNR-322L - Authenticated Remote Code Execution Vulnerability Exploited in the Wild🚨 Vulnerability Details: CVE-2022-40799(CVSS 8.8/10) D-Link DNR-322L - Authenticated Remote Code Execution Vulnerability Impact: A successful exploit may allow an

🚨CVE Alert: D-Link DNR-322L - Authenticated Remote Code Execution Vulnerability Exploited in the Wild🚨 

Vulnerability Details: CVE-2022-40799(CVSS 8.8/10) D-Link DNR-322L - Authenticated Remote Code Execution Vulnerability

Impact: A successful exploit may allow an
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Unknown Threat Actors Use Makop Ransomware, Mimikatz, and NirSoft Tools in RDP-Based Attacks Targeting South Korean Users🚨 Summary: Makop ransomware campaigns have targeted South Korean users, leveraging brute-force attacks on exposed RDP services for

🚨Threat Campaign Alert: Unknown Threat Actors Use Makop Ransomware, Mimikatz, and NirSoft Tools in RDP-Based Attacks Targeting South Korean Users🚨

Summary: Makop ransomware campaigns have targeted South Korean users, leveraging brute-force attacks on exposed RDP services for
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🔒CyberXTron Weekly Newsletter🔒 Access our Weekly Cyber News Letter for August 2025 Week 1. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs. Report Link:

🔒CyberXTron Weekly Newsletter🔒

Access our Weekly Cyber News Letter for August 2025 Week 1. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs.

Report Link:
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Efimer Trojan Campaign Targeting Cryptocurrency Users via Phishing, Compromised WordPress Sites, and Malicious Torrents🚨 Summary: A large-scale campaign is distributing the Efimer ClipBanker Trojan through phishing emails impersonating lawyers,

🚨Threat Campaign Alert: Efimer Trojan Campaign Targeting Cryptocurrency Users via Phishing, Compromised WordPress Sites, and Malicious Torrents🚨

Summary: A large-scale campaign is distributing the Efimer ClipBanker Trojan through phishing emails impersonating lawyers,
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: PowerShell RAT Campaign Targeting Israeli Organizations via Hijacked Email and Spoofed Microsoft Teams Phishing🚨 Summary: A sophisticated campaign targeting against Israeli organizations, where attackers hijacked internal email systems to send phishing

🚨Threat Campaign Alert: PowerShell RAT Campaign Targeting Israeli Organizations via Hijacked Email and Spoofed Microsoft Teams Phishing🚨

Summary: A sophisticated campaign targeting against Israeli organizations, where attackers hijacked internal email systems to send phishing
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Curly COMrades APT Targets Georgia & Moldova’s Government and Energy Sectors Using MucorAgent Backdoor & Proxy Tools🚨 Summary: A newly discovered Russia-aligned APT, Curly COMrades, is targeting Georgian government/judicial bodies and a Moldovan energy

🚨Threat Campaign Alert: Curly COMrades APT Targets Georgia & Moldova’s Government and Energy Sectors Using MucorAgent Backdoor & Proxy Tools🚨

Summary: A newly discovered Russia-aligned APT, Curly COMrades, is targeting Georgian government/judicial bodies and a Moldovan energy
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🔒CyberXTron Weekly Newsletter🔒 Access our Weekly Cyber News Letter for August 2025 Week 2. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs. Report Link:

🔒CyberXTron Weekly Newsletter🔒

Access our Weekly Cyber News Letter for August 2025 Week 2. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs.

Report Link:
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Water Gamayun Russia-Based Threat Actor Targets Global Web3 Developers & Enterprises Using Social Engineering🚨 Summary: Water Gamayun, an emerging Russia-linked threat group, is actively targeting global Web3 developers and enterprises through social

🚨Threat Campaign Alert: Water Gamayun Russia-Based Threat Actor Targets Global Web3 Developers & Enterprises Using Social Engineering🚨

Summary: Water Gamayun, an emerging Russia-linked threat group, is actively targeting global Web3 developers and enterprises through social
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: Warlock Ransomware Group Exploits Microsoft SharePoint to Target Government, Financial & Manufacturing Sectors Worldwide🚨 Summary: The Warlock ransomware group, is exploiting unpatched on-premise Microsoft SharePoint vulnerabilities to infiltrate

🚨Threat Campaign Alert: Warlock Ransomware Group Exploits Microsoft SharePoint to Target Government, Financial & Manufacturing Sectors Worldwide🚨

Summary: The Warlock ransomware group, is exploiting unpatched on-premise Microsoft SharePoint vulnerabilities to infiltrate
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨CVE Alert: Critical Apple Zero-Day Vulnerability Exploited in the Wild🚨 Vulnerability Details: CVE-2025-43300 - Critical Apple Zero-Day Vulnerability Impact: A successful exploit may allow an authenticated attacker to execute arbitrary code and take full control of the

🚨CVE Alert: Critical Apple Zero-Day Vulnerability Exploited in the Wild🚨 

Vulnerability Details: CVE-2025-43300 - Critical Apple Zero-Day Vulnerability

Impact: A successful exploit may allow an authenticated attacker to execute arbitrary code and take full control of the
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🚨Threat Campaign Alert: APT36 Targets Indian Government & Defense with Linux .desktop Malware🚨 Summary: APT36 (Transparent Tribe), a Pakistan-based threat actor, is conducting spear-phishing campaigns against Indian government and defense sectors using malicious Linux .desktop

🚨Threat Campaign Alert: APT36 Targets Indian Government & Defense with Linux .desktop Malware🚨

Summary: APT36 (Transparent Tribe), a Pakistan-based threat actor, is conducting spear-phishing campaigns against Indian government and defense sectors using malicious Linux .desktop
CyberXTron Technologies (@cyberxtrontech) 's Twitter Profile Photo

🔒CyberXTron Weekly Newsletter🔒 Access our Weekly Cyber News Letter for August 2025 Week 3. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs. Report Link:

🔒CyberXTron Weekly Newsletter🔒

Access our Weekly Cyber News Letter for August 2025 Week 3. Our Cyber News Letter provides a comprehensive view of emerging cyber threats, targeted campaigns, ransomware attacks, and in-the-wild exploited CVEs.

Report Link: