CYBER ATTACK

New SnappyClient Implant Enables Remote Access, Data Theft, and Stealth

New SnappyClient Implant Enables Remote Access, Data Theft, and Stealth

CYBER ATTACKZerowl

In December 2025, security researchers at Zscaler ThreatLabz found a new command-and-control (C2) framework implant called SnappyClient This article.

New SnappyClient Implant Combines Remote Access, Data Theft and Advanced Evasion

New SnappyClient Implant Combines Remote Access, Data Theft and Advanced Evasion

CYBER ATTACKZerowl

Discover how A new piece of malware called SnappyClient is a big threat to Windows users. It combines remote access, data theft, and advanced evasion.

Malware Operators Hijack Network Devices For DDoS Attacks and Crypto Mining

Malware Operators Hijack Network Devices For DDoS Attacks and Crypto Mining

CYBER ATTACKZerowl

As hackers focus more on network infrastructure instead of traditional endpoints, the attack surface of businesses is changing quickly. Researchers in the.

Iran-Linked Cyber Operations Merge With Electronic Warfare As Regional Tensions Surge

Iran-Linked Cyber Operations Merge With Electronic Warfare As Regional Tensions Surge

CYBER ATTACKZerowl

A joint US-Israeli military operation began strikes inside Iran on February 28, 2026 This article explores world cyber escalation. . This started a huge.

Iran-Linked Botnet Exposed After Open Directory Leak Reveals 15-Node Relay Network

Iran-Linked Botnet Exposed After Open Directory Leak Reveals 15-Node Relay Network

CYBER ATTACKZerowl

Discover how A threat actor with ties to Iran has had their entire working infrastructure exposed after carelessly leaving an open directory on their own.

Hackers Exploit OpenWebUI Servers to Deploy AI-Powered Payloads

Hackers Exploit OpenWebUI Servers to Deploy AI-Powered Payloads

CYBER ATTACKZerowl

Hackers are using poorly set up OpenWebUI servers to spread AI-generated payloads that steal credentials and mine cryptocurrency on both Linux and Windows.

Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirects

Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirects

CYBER ATTACKZerowl

Security researchers have revealed a serious multi-stage attack chain that affects Anthropic's Claude.ai platform This article explores redirect.

CISA Warns of Microsoft SharePoint Vulnerability Exploited in Attacks

CISA Warns of Microsoft SharePoint Vulnerability Exploited in Attacks

CYBER ATTACKZerowl

CISA warns that Microsoft SharePoint is vulnerable to attacks A serious security hole in Microsoft SharePoint has been found to be actively used, and on.

Backdoored Open VSX Extension Used GitHub Downloader to Install RAT and Stealer

Backdoored Open VSX Extension Used GitHub Downloader to Install RAT and Stealer

CYBER ATTACKZerowl

A well-known code editor extension on the Open VSX registry was found to have hidden malware that quietly downloads and runs a remote access trojan (RAT).

UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security

UIDAI Launches Bug Bounty Programme to Strengthen Aadhaar Security

CYBER ATTACKZerowl

UIDAI Bug Bounty Program Makes Aadhaar More Secure The Unique Identification Authority of India (UIDAI) has officially started its first organized Bug.

UIDAI Launches Bug Bounty Program to Boost Aadhaar Security

UIDAI Launches Bug Bounty Program to Boost Aadhaar Security

CYBER ATTACKZerowl

The Unique Identification Authority of India (UIDAI) has started its first structured bug bounty program as part of its ongoing work to make the Aadhaar.

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

CYBER ATTACKZerowl

ConnectWise has sent out an urgent security alert for its ScreenConnect remote desktop software This article explores keys screenconnect vulnerability.

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

CYBER ATTACKZerowl

Another blow to network security. Two new types of malware have appeared that can quietly turn routers, IoT devices, and enterprise network equipment into.

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

CYBER ATTACKZerowl

LeakNet is a ransomware group that has been quietly working on a more dangerous way to attack This article explores leaknet ransomware. . The group used.

ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push

ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push

CYBER ATTACKZerowl

ForceMemo is a new malware campaign that is quietly hacking hundreds of GitHub accounts and adding hidden harmful code to Python repositories, leaving.

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

CYBER ATTACKZerowl

FancyBear, a Russian state-linked hacking group, made a big mistake in operational security that gave security researchers an unusually clear picture of.

Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23

Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23

CYBER ATTACKZerowl

The GNU Inetutils telnetd daemon has a serious buffer overflow flaw. This flaw, which is tracked as CVE-2026-32746, lets an unauthenticated remote.

Apple WebKit flaw lets bad web content get around on iOS and macOS

Apple WebKit flaw lets bad web content get around on iOS and macOS

CYBER ATTACKZerowl

Apple WebKit Vulnerability Lets Bad Web Content Bypass on iOS and macOS Apple has released important security updates to fix a serious WebKit.

Vidar Stealer 2.0 Spreads Through Fake Game Cheats Promoted on GitHub and Reddit

Vidar Stealer 2.0 Spreads Through Fake Game Cheats Promoted on GitHub and Reddit

CYBER ATTACKZerowl

Vidar 2.0, a new version of the Vidar infostealer, is spreading quickly through hundreds of fake game cheat repositories on GitHub and targeted posts on.

Ubuntu Desktop Systems Vulnerability Enables Attackers to Gain Full Root Access

Ubuntu Desktop Systems Vulnerability Enables Attackers to Gain Full Root Access

CYBER ATTACKZerowl

Weaknesses in Ubuntu Desktop Systems A Local Privilege Escalation (LPE) flaw in default installations of Ubuntu Desktop 24.04 and later lets an attacker.

‘RegPwn’ Windows Registry Vulnerability Enables Full System Access to Attackers

‘RegPwn’ Windows Registry Vulnerability Enables Full System Access to Attackers

CYBER ATTACKZerowl

Discover how There is a security hole in the Windows Registry called RegPwn. The "RegPwn" (CVE-2026-24291) Windows vulnerability is a high-severity flaw.

OpenAI Launches GPT-5.4 Mini and Nano, Delivering Answers 2× Faster

OpenAI Launches GPT-5.4 Mini and Nano, Delivering Answers 2× Faster

CYBER ATTACKZerowl

OpenAI has released GPT-5.4 Mini and Nano, two small-footprint models that promise answers that are up to twice as fast as previous GPT-5 Mini models.

Microsoft Teams Support Call Leads to Quick Assist Compromise in New Vishing Attack

Microsoft Teams Support Call Leads to Quick Assist Compromise in New Vishing Attack

CYBER ATTACKZerowl

The Microsoft Detection and Response Team talks about a complex voice phishing (vishing) campaign that broke into a business setting in November 2025 This.

Malicious Telegram Download Site Pushes Multi-Stage Loader With In-Memory Execution

Malicious Telegram Download Site Pushes Multi-Stage Loader With In-Memory Execution

CYBER ATTACKZerowl

Discover how A fake Telegram download site is actively spreading dangerous malware by hiding a malicious installer as a real setup file. The site, which.

Diplomats and Critical Infrastructure Targeted In Boggy Serpens Spy Campaign

Diplomats and Critical Infrastructure Targeted In Boggy Serpens Spy Campaign

CYBER ATTACKZerowl

Boggy Serpens, also known as MuddyWater, is a cyberespionage group that is currently running hacking campaigns against targets all over the world. This.

Critical Telnetd Vulnerability Allows Remote Code Execution Attacks

Critical Telnetd Vulnerability Allows Remote Code Execution Attacks

CYBER ATTACKZerowl

A newly revealed serious security hole in GNU The telnetd daemon in Inetutils could let attackers who aren't logged in take full control of affected.

Critical FortiClient SQL Injection Vulnerability Enables Arbitrary Database Access

Critical FortiClient SQL Injection Vulnerability Enables Arbitrary Database Access

CYBER ATTACKZerowl

FortiClient SQL Injection flaw A serious SQL injection hole in Fortinet's FortiClient Endpoint Management Server (EMS). This serious flaw has a CVSS score.

Boggy Serpens Targets Diplomats and Critical Infrastructure in Multi-Wave Espionage Campaign

Boggy Serpens Targets Diplomats and Critical Infrastructure in Multi-Wave Espionage Campaign

CYBER ATTACKZerowl

The Iranian nation-state group Boggy Serpens, also known as MuddyWater, has greatly increased its cyberespionage activities This article explores.

Attackers Abuse Court Documents, GitHub Payloads to Infect Judicial Targets With COVERT RAT

Attackers Abuse Court Documents, GitHub Payloads to Infect Judicial Targets With COVERT RAT

CYBER ATTACKZerowl

A new wave of targeted attacks is quietly hitting Argentina's judicial system This article explores hitting argentina judicial. . They use fake court.

Top 5 this week

Page 12 of 44