Cubex Group
  • Home
  • Services
    • Cubex Group Security Solution
    • Staffing Solutions
    • IT Solutions Consulting
    • MSP Custom Solutions
    • Security Awareness Training
  • About
  • News
    • Blog
    • Industry Articles
  • Contact
Select Page
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File ​

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File ​

by cubexgroup | May 28, 2025

Read More Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that, if successfully exploited, could allow websites to access a user’s entire cloud storage content, as opposed to just the files selected for upload...
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto ​

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto ​

by cubexgroup | May 28, 2025

Read More Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware...
From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign ​

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign ​

by cubexgroup | May 28, 2025

Read More Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise....
Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware ​

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware ​

by cubexgroup | May 28, 2025

Read More A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader,...
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds ​

How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds ​

by cubexgroup | May 28, 2025

Read More Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens if they fall victim to a Browser-in-the-Middle (BitM) attack. Like...
« Older Entries
Next Entries »

Recent Posts

  • Who’s in Charge Here? Managing IT Vendor Relationships Without Losing Your Mind
  • AI Personal Assistants for Business: Picking the Right Fit for Your Operations
  • How Hiring a Fractional CTO Helped a Consulting Firm Cost-Effectively Liquidate a Private College
  • Why You Need a Business VPN Strategy in 2025
  • Deck the Halls with Caution: Holiday Scams to Dodge in 2024  

Quick Links

About Us

Cubex Group is an IT consulting firm that’s committed to doing right by you, our clients. We invest time to understand your successes and struggles, and design IT solutions that are attuned to what is right and enriching for your business and environment.

Quick Links

Contact

MSP Custom Solutions

Staffing Solution

Security Awareness Training

Home

IT Solutions Consulting

About

Blog

Careers

Contact Us

 223 Wall Street, Suite 267, Huntington, NY 11743

917.67.CUBEX (28239)

info@cubexgroup.com

Follow Us on LinkedIn
SEND US A MESSAGE

Cubex Group © 2025 All rights reserved.

Privacy Policy      Terms & Conditions

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok