Attackers have been observed misusing Google Cloud Storage to distribute malware through phishing campaigns. Instead of relying on suspicious or newly registered domains, they host malicious payloads on trusted Google infrastructure, making the links appear legitimate. Victims, primarily in the financial sector, receive phishing emails containing URLs that lead to files such as VBS scripts and Java-based malware. Once executed, these payloads enable remote access, data theft, and system compromise. This activity is effective because it exploits the inherent trust organizations place in well-known cloud services. Security tools often allow traffic to domains like storage.googleapis.com, reducing the likelihood of detection. Additionally, attackers continuously rotate files and URLs, making it difficult for traditional signature-based defenses to keep up. The use of compromised email accounts further increases credibility, improving the chances of user interaction and successful infection. To mitigate such threats, organizations should implement advanced email security solutions with URL inspection and sandboxing capabilities. Restricting access to cloud storage links where unnecessary and monitoring endpoint activity for suspicious script execution can help detect infections early. User awareness training is also critical to ensure employees verify links, even if they appear to come from trusted platforms. Keeping endpoint protection updated and applying strict access controls can significantly reduce exposure.
A critical vulnerability in nginx-ui, a web-based Nginx management tool, is being actively exploited in the wild. Identified as CVE-2026-33032 with a CVSS rating of 9.8, this vulne...
Cisco has released a security advisory addressing two newly identified vulnerabilities affecting its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Th...
Attackers have breached the n8n workflow automation platform through the delivery of a malware npm package under the guise of a legitimate integration. The threat actors carried ou...