Telegram QR code phishing has recently been spreading rapidly, emerging as a significant cybersecurity threat. While Telegram is recognized for its strong security and privacy features, attackers are now exploiting its QR login functionality to compromise user accounts. With just a single scan, attackers can gain full access to an account, leading to far more sophisticated and [...] The post Telegram QR Phishing Threat – Account Takeover with a Single Scan appeared first on CIP Blog.| CIP Blog
On August 14, 2025, Lotte Card’s online payment server in South Korea was compromised, leading to large-scale data exfiltration attempts. The attack persisted for two days, with signs that at least 1.7GB of internal data was about to be extracted. The critical issue was delayed detection. Malicious code and a web shell were only discovered [...] The post CVE-2017-10271: Oracle WebLogic Server Vulnerability appeared first on CIP Blog.| CIP Blog
The Criminal IP search engine, used in over 180 countries worldwide, collects a vast amount of search data every day.What are the most common keywords entered by security professionals? In this post, we highlight four of the Top 10 Criminal IP keywords as of August 2025, explaining the threats each represents and how Criminal IP [...] The post Exploring Threat Infrastructures Detected by Security Professionals Through Criminal IP’s Top 10 Keywords appeared first on CIP Blog.| CIP Blog
An update and maintenance to Criminal IP v1.87.0 has been released. [Criminal IP v1.87.0] Regular Maintenance and Update Release Note Maintenance and Update Period: 2025.09.04 05:00~10:00 AM (UTC) [New Changes] Criminal IP Pricing Plan Restructuring As previously announced, the Criminal IP paid plans have been restructured. The existing Lite, Medium, and Pro subscription plans have [...] The post [Criminal IP v1.87.0] 2025-09-04 Release Note appeared first on CIP Blog.| CIP Blog
This article reviews the vulnerabilities and current threat landscape while demonstrating how Criminal IP can be used to detect and respond to| CIP Blog