CYBER ATTACK

North Korean Hackers Compromise Popular Axios Package to Infect Windows, macOS, and Linux

North Korean Hackers Compromise Popular Axios Package to Infect Windows, macOS, and Linux

CYBER ATTACKZerowl

A major attack on the JavaScript ecosystem's software supply chain has happened after a malicious dependency injection into the Axios NPM package, which.

LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions

LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions

CYBER ATTACKZerowl

When you open LinkedIn in Chrome, hidden JavaScript scans your computer without your knowledge or permission This article explores linkedin surveillance.

Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware

Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware

CYBER ATTACKZerowl

Anthropic accidentally made the whole source code for Claude Code, its main terminal-based coding assistant, public. The leak of Claude Code on GitHub has.

Anthropic Officially Terminates Claude Subscriptions Used by Tools Like OpenClaw

Anthropic Officially Terminates Claude Subscriptions Used by Tools Like OpenClaw

CYBER ATTACKZerowl

Discover how Anthropic has officially blocked third-party AI agents from accessing its Claude subscription levels. This change means that people can't use.

Top 10 Best VPN For Chrome in 2026

Top 10 Best VPN For Chrome in 2026

CYBER ATTACKZerowl

The Chrome extension for NordVPN hides your IP address and protects your browser traffic, even when you're connected to an unsecured Wi-Fi network.

Top 10 Best User Access Management Tools in 2026

Top 10 Best User Access Management Tools in 2026

CYBER ATTACKZerowl

A User Access Management Tool (UAM) is a type of software that helps businesses set up and enforce rules about who can access what This article explores.

North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack

North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack

CYBER ATTACKZerowl

A group linked to North Korea has successfully hacked into Axios, a well-known JavaScript library This article explores hacked axios known. . The group.

LinkedIn Accused of Secretly Checking Devices for Installed Applications

LinkedIn Accused of Secretly Checking Devices for Installed Applications

CYBER ATTACKZerowl

Security researchers have found evidence that Microsoft subsidiary LinkedIn was running a large-scale secret surveillance operation This article explores.

Hackers used the Claude Code Leak to send Vidar and GhostSocks.

Hackers used the Claude Code Leak to send Vidar and GhostSocks.

CYBER ATTACKZerowl

Threat actors take advantage of the recent leak of Anthropic Claude code This article explores malware ai claude. . Recent developers looking for the.

Anthropic officially ends Claude subscriptions for third-party tools like OpenClaw.

Anthropic officially ends Claude subscriptions for third-party tools like OpenClaw.

CYBER ATTACKZerowl

Discover how People who subscribe to Claude Pro and Max will no longer be able to use their current subscription limits for third-party automation tools.

Threat Actors Impersonate CERT-UA In Go-Based RAT Delivery Campaign

Threat Actors Impersonate CERT-UA In Go-Based RAT Delivery Campaign

CYBER ATTACKZerowl

The Computer Emergency Response Team of Ukraine (CERT-UA) stopped a bad cyber campaign. Threat actors pretended to be the agency in order to spread.

New Progress ShareFile Vulnerabilities Enable Server Takeover with No Login Required

New Progress ShareFile Vulnerabilities Enable Server Takeover with No Login Required

CYBER ATTACKZerowl

WatchTowr Labs' security researchers have found a serious exploit chain that targets the Progress ShareFile Storage Zone Controller This article explores.

Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2

Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2

CYBER ATTACKZerowl

Discover how Microsoft has officially started to force-upgrade unmanaged Windows 11 version 24H2 devices to version 25H2. This change, which is now shown.

Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations

Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations

CYBER ATTACKZerowl

Security experts have found a harmful Google Chrome extension called "ChatGPT Ad Blocker." This tool claims to block unwanted ads, but it actually listens.

Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines

Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines

CYBER ATTACKZerowl

ClickFix social engineering is built right into the operator panel of Venom Stealer This article explores developer goes venomstealer. . It handles every.

Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware

Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware

CYBER ATTACKZerowl

Phorpiex, or Trik, has gone from being a simple spam tool to a complex criminal platform This article explores phorpiex follow malwarebazaar. . The newest.

Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users

Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users

CYBER ATTACKZerowl

Group-IB CERT researchers found this phishing scheme and called it PHISLES This article explores banks careful emails. . They also confirmed that it has.

FBI Flags Chinese Mobile Apps Over Potential Data Exposure Risks

FBI Flags Chinese Mobile Apps Over Potential Data Exposure Risks

CYBER ATTACKZerowl

As of early 2026, a lot of popular and profitable apps in the US and around the world are made by Chinese companies This article explores likely apps.

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation

CYBER ATTACKZerowl

The U.S This article explores state cyberattacks cisa. . Cybersecurity and Infrastructure Security Agency (CISA) has added a serious security hole.

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

Axios npm Supply Chain Attack Prompts Microsoft Mitigation Guidance

CYBER ATTACKZerowl

Researchers found a serious supply chain attack on Axios, a popular HTTP client for JavaScript that gets over 70 million downloads a week This article.

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack

CYBER ATTACKZerowl

On March 31, 2026, two versions of the popular JavaScript HTTP library Axios were briefly uploaded to npm This article explores broken versions axios.

North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks

North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks

CYBER ATTACKZerowl

A new campaign that is going after South Korea is using Windows shortcut files, or LNK files, to send targeted phishing emails through GitHub This article.

New Chrome Zero-Day Vulnerability Under Active Exploitation – Patch Now

New Chrome Zero-Day Vulnerability Under Active Exploitation – Patch Now

CYBER ATTACKZerowl

Google has put out an urgent security update for its Chrome desktop browser to fix 21 security holes This article explores security update chrome. . The.

CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach

CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach

CYBER ATTACKZerowl

Recently, the European Commission's main website, "europa.eu," had a major data breach because of a supply-chain vulnerability that was exploited by.

Best VPN For Linux In 2026

Best VPN For Linux In 2026

CYBER ATTACKZerowl

Discover how A good Linux-based Virtual Private Network encrypts your internet traffic, hides your IP address, and lets you access any content anywhere in.

Apple Rolls Out iOS 18.7.7 to Counter DarkSword Exploit Threat

Apple Rolls Out iOS 18.7.7 to Counter DarkSword Exploit Threat

CYBER ATTACKZerowl

Apple has greatly increased the number of iOS 18.7.7 installations through Automatic Updates. The change is part of a larger effort to keep users safe.

Top 5 this week

Page 1 of 43