CYBER ATTACK

WhatsApp Introduces Optional Account Password Feature to Strengthen Login Security

WhatsApp Introduces Optional Account Password Feature to Strengthen Login Security

CYBER ATTACKZerowl

WhatsApp Password Feature (Source: Wabetainfo) WhatsApp has released a new Android update through the Google Play Beta Program, bringing the version up to.

Starkiller Phishing Framework Proxies Real Login Pages To Evade MFA

Starkiller Phishing Framework Proxies Real Login Pages To Evade MFA

CYBER ATTACKZerowl

The world of cybercrime is taking notice of Starkiller, a new and advanced phishing framework This article explores phishing framework starkiller.

Hackers Leverage DeepSeek and Claude to Attack FortiGate Devices Worldwide

Hackers Leverage DeepSeek and Claude to Attack FortiGate Devices Worldwide

CYBER ATTACKZerowl

A serious cybersecurity threat involving the advanced use of Large Language Models (LLMs) in ongoing intrusion campaigns surfaced in early February 2026.

GrayCharlie Campaign Compromises WordPress Sites To Spread NetSupport RAT and Steal Data

GrayCharlie Campaign Compromises WordPress Sites To Spread NetSupport RAT and Steal Data

CYBER ATTACKZerowl

Since its formation in the middle of 2023, the GrayCharlie group has been a cybercriminal organization that actively compromises WordPress websites in.

Google Chrome Emergency Security Update Patches Three High-Severity Vulnerabilities

Google Chrome Emergency Security Update Patches Three High-Severity Vulnerabilities

CYBER ATTACKZerowl

Emergency Security Update for Google Chrome Google has pushed version 145.0.7632.116/117, a critical security update for Chrome, to Windows and macOS.

Anthropic Claude Faces Large-Scale Distillation Attacks by Chinese AI Labs Involving 13 Million Exchanges

Anthropic Claude Faces Large-Scale Distillation Attacks by Chinese AI Labs Involving 13 Million Exchanges

CYBER ATTACKZerowl

Anthropic has disclosed that its Claude AI models were the target of industrial-scale distillation campaigns carried out by three Chinese AI labs.

A bounty of over $10,000 is being offered to hackers who can disconnect Ring video doorbells from Amazon Cloud.

A bounty of over $10,000 is being offered to hackers who can disconnect Ring video doorbells from Amazon Cloud.

CYBER ATTACKZerowl

A $10K+ bounty is offered to the hacker who disconnects the Amazon Cloud ring This article explores doorbells amazon cloud. . Anyone who can successfully.

North Korean Hackers Use Fake IT Worker Scheme To Infiltrate Firms

North Korean Hackers Use Fake IT Worker Scheme To Infiltrate Firms

CYBER ATTACKZerowl

In order to steal data and make money for their government, North Korean state-sponsored hackers are increasingly impersonating IT professionals in order.

Google Rushes Emergency Chrome Update to Fix Three High-Severity Security Flaws

Google Rushes Emergency Chrome Update to Fix Three High-Severity Security Flaws

CYBER ATTACKZerowl

Three high-severity flaws in Google's Chrome browser have been fixed with an urgent security update that could put users at significant risk This article.

The largest data breach in U.S. history, Conduent, occurred when a ransomware group stole 8 TB of data.

The largest data breach in U.S. history, Conduent, occurred when a ransomware group stole 8 TB of data.

CYBER ATTACKZerowl

Millions of people received notification letters about the Conduent Data Breach, as the ransomware group claimed that eight terabytes had been stolen in.

North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

CYBER ATTACKZerowl

Discover how North Korean nation-state threat actors have been conducting a two-pronged operation in which they embed fictitious employees inside.

New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

CYBER ATTACKZerowl

Recently, a very complex phishing framework called Starkiller surfaced, giving attackers a cutting-edge way to get around multi-factor authentication and.

New MIMICRAT Custom RAT Uncovered in Sophisticated Multi-Stage ClickFix Campaign

New MIMICRAT Custom RAT Uncovered in Sophisticated Multi-Stage ClickFix Campaign

CYBER ATTACKZerowl

A sophisticated new cyber campaign has been discovered that uses a trick called "ClickFix" to spread a unique remote access trojan called MIMICRAT This.

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users

CYBER ATTACKZerowl

Users in the North America region have reported frequent 504 gateway timeout errors when trying to authenticate into MFA-protected services, prompting.

Threat Actor Allegedly Claimed Leak of Wendy’s International Franchise Database

Threat Actor Allegedly Claimed Leak of Wendy’s International Franchise Database

CYBER ATTACKZerowl

Data Breach at Wendy On February 22, 2026, a threat actor claimed to have leaked what they are referring to as the "Wendy's International Franchise.

PoC Exploit Released for Grandstream GXP1600 VoIP Phones RCE Vulnerability

PoC Exploit Released for Grandstream GXP1600 VoIP Phones RCE Vulnerability

CYBER ATTACKZerowl

RCE Vulnerability in Grandstream GXP1600 VoIP Phones Grandstream's GXP1600 series VoIP desk phones are vulnerable to a critical zero-day vulnerability.

A vulnerability in the HPE Telco Service Activator allows attackers to circumvent access restrictions.

A vulnerability in the HPE Telco Service Activator allows attackers to circumvent access restrictions.

CYBER ATTACKZerowl

The February 19, 2026, release of the HPE Telco Service Activator Vulnerability Security Bulletin fixes a remote vulnerability in the program that could.

Silver Fox APT Uses DLL Sideloading and BYOVD Techniques in Sophisticated Malware Attacks

Silver Fox APT Uses DLL Sideloading and BYOVD Techniques in Sophisticated Malware Attacks

CYBER ATTACKZerowl

Targeted malware campaigns connected to the Silver Fox threat group have recently surfaced in the cybersecurity community This article explores.

Silver Fox APT Exploits DLL Sideloading and BYOVD In Stealth Campaign

Silver Fox APT Exploits DLL Sideloading and BYOVD In Stealth Campaign

CYBER ATTACKZerowl

Discover how The Silver Fox APT group has been linked to a number of targeted phishing campaigns in Taiwan, according to FortiGuard Labs. To trick victims.

Google Suspends OpenClaw Users from Antigravity AI After OAuth Token Abuse

Google Suspends OpenClaw Users from Antigravity AI After OAuth Token Abuse

CYBER ATTACKZerowl

Google Suspends Users of OpenClaw Many users of Google's open-source Antigravity AI platform have had their access to the platform suspended This article.

FBI Warns Of Ploutus Malware Draining U.S. ATMs Without Cards

FBI Warns Of Ploutus Malware Draining U.S. ATMs Without Cards

CYBER ATTACKZerowl

Financial institutions are being warned by the Federal Bureau of Investigation (FBI) in an emergency FLASH alert about an increase in ATM jackpotting.

DPRK Linked Operators Sustain Aggressive Crypto Targeting 12 Months After Bybit Breach

DPRK Linked Operators Sustain Aggressive Crypto Targeting 12 Months After Bybit Breach

CYBER ATTACKZerowl

The largest known cryptocurrency theft in history occurred on February 21, 2026, when operators with ties to North Korea (DPRK) stole about $1.46 billion.

CISA Warns of Multiple Roundcube Vulnerabilities Exploited in Attacks

CISA Warns of Multiple Roundcube Vulnerabilities Exploited in Attacks

CYBER ATTACKZerowl

New security vulnerabilities impacting a well-known webmail platform have been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog. Based on.

Threat Actors Allegedly Selling WhatsApp Crash Exploit on Hacking Forums

Threat Actors Allegedly Selling WhatsApp Crash Exploit on Hacking Forums

CYBER ATTACKZerowl

Actors of Threat Hacking Forums: WhatsApp Crash Exploit Claim (Source: Darkweb Informer) Concerns regarding a new exploit that targets the well-known.

Study Finds LLM-Generated Passwords Highly Predictable and Repetitive

Study Finds LLM-Generated Passwords Highly Predictable and Repetitive

CYBER ATTACKZerowl

Research Discovers LLM-Generated Passwords Extremely repetitive and predictable This article explores passwords llms predictable. . An AI firm's recent.

New CharlieKirk Grabber Malware Steals Login Data From Windows PCs

New CharlieKirk Grabber Malware Steals Login Data From Windows PCs

CYBER ATTACKZerowl

CharlieKirk Grabber, a recently discovered Windows infostealer, uses a quick "smash-and-grab" method to steal credentials from users This article explores.

Top 5 this week

Page 1 of 24