CYBER ATTACK

Apple WebKit Vulnerability Allows Malicious Content Bypass on iOS and macOS

Apple WebKit Vulnerability Allows Malicious Content Bypass on iOS and macOS

CYBER ATTACKZerowl

Apple has put out emergency security updates to fix a serious WebKit flaw that makes iPhone, iPad, and Mac users vulnerable to advanced web-based attacks.

Critical ‘RegPwn’ Vulnerability Lets Attackers Gain SYSTEM Access on Windows

Critical ‘RegPwn’ Vulnerability Lets Attackers Gain SYSTEM Access on Windows

CYBER ATTACKZerowl

MDSec researchers have revealed a new Windows vulnerability called "RegPwn" that lets attackers go from being a low-privileged user to having full SYSTEM.

Critical FortiClient SQL Injection Flaw Allows Unauthorized Database Access

Critical FortiClient SQL Injection Flaw Allows Unauthorized Database Access

CYBER ATTACKZerowl

A serious security hole in Fortinet's FortiClient Enterprise Management Server (EMS) is causing a lot of worry in business settings, especially those that.

Credential-Stealing npm Malware Found In Popular React Native Packages

Credential-Stealing npm Malware Found In Popular React Native Packages

CYBER ATTACKZerowl

Researchers found a coordinated supply chain attack on two popular React Native npm packages on March 16, 2026. The infected releases add an install-time.

AWS Bedrock AgentCore Flaw Enables Stealthy C2 Channels and Data Theft

AWS Bedrock AgentCore Flaw Enables Stealthy C2 Channels and Data Theft

CYBER ATTACKZerowl

Researchers have shown a way to get around the sandbox isolation of AWS Bedrock AgentCore Code Interpreter, which has raised serious concerns about a.

Glassworm Attacks Popular React Native Packages with npm Malware That Steals Credentials

Glassworm Attacks Popular React Native Packages with npm Malware That Steals Credentials

CYBER ATTACKZerowl

On March 16, 2026, a coordinated supply chain attack hit the developer community This article explores backdoored popular react. . A hacker known as.

UK’s Companies House WebFiling Flaw Exposed Private Director Data for Five Months

UK’s Companies House WebFiling Flaw Exposed Private Director Data for Five Months

CYBER ATTACKZerowl

The UK government's official business register, Companies House, has found a serious security hole in its WebFiling service This article explores agency.

To Beat Alert Overload, Stop Wasting Time on False Positives

To Beat Alert Overload, Stop Wasting Time on False Positives

CYBER ATTACKZerowl

Stop wasting time on false positives to avoid alert overload This article explores suspicious alerts prioritized. . At first glance, false positives in.

Simple Custom Font Rendering Can Poison ChatGPT, Claude, Gemini, and Other AI Systems

Simple Custom Font Rendering Can Poison ChatGPT, Claude, Gemini, and Other AI Systems

CYBER ATTACKZerowl

A new way to attack that takes advantage of a basic flaw in AI web assistants: the difference between what a browser shows a user and what an AI tool.

New Windows 11 25H2/24H2 Update Fixes Bluetooth Devices Visibility Issues

New Windows 11 25H2/24H2 Update Fixes Bluetooth Devices Visibility Issues

CYBER ATTACKZerowl

The Windows 11 25H2/24H2 Update fixes problems with Bluetooth devices not being able to see each other This article explores bluetooth fix microsoft.

New Alert: Hackers Hijack Corporate M365 Accounts with OAuth Device Codes

New Alert: Hackers Hijack Corporate M365 Accounts with OAuth Device Codes

CYBER ATTACKZerowl

Recently, ANY.RUN, a top provider of interactive malware analysis and threat intelligence solutions, has seen a rise in phishing activity that takes.

Kubernetes CSI Driver for NFS Vulnerability Lets Attackers Delete or Modify NFS Server Directories

Kubernetes CSI Driver for NFS Vulnerability Lets Attackers Delete or Modify NFS Server Directories

CYBER ATTACKZerowl

Kubernetes CSI Driver NFS Security Hole The Kubernetes Container Storage Interface (CSI) Driver for NFS has a path traversal vulnerability that could let.

Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials

Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials

CYBER ATTACKZerowl

Storm-2561 is a financially motivated hacker who has been stealing credentials since May 2025 This article explores storm 2561 uses. . They do this by.

Windows 11 25H2/24H2 Update Fixes Bluetooth Visibility Problems

Windows 11 25H2/24H2 Update Fixes Bluetooth Visibility Problems

CYBER ATTACKZerowl

Microsoft has released an out-of-band hotpatch, KB5084897, to fix a serious problem with Bluetooth device visibility that affects Windows 11 versions 24H2.

Stryker Confirms Massive Wiper Attack That Erased Thousands of Devices

Stryker Confirms Massive Wiper Attack That Erased Thousands of Devices

CYBER ATTACKZerowl

Stryker, a global leader in medical technology, has confirmed a large-scale cyberattack that wiped out tens of thousands of corporate devices around the.

Researchers Decrypt and Exploit Encrypted Palo Alto Cortex XDR BIOC Rules

Researchers Decrypt and Exploit Encrypted Palo Alto Cortex XDR BIOC Rules

CYBER ATTACKZerowl

Ways Decrypt and misuse encrypted Palo Alto Cortex XDR BIOC rules to get around them This article explores decrypt behavioral rules. . Cybersecurity.

Phishers Weaponize Safe Links With Multi-Layered URL Rewriting to Evade Detection

Phishers Weaponize Safe Links With Multi-Layered URL Rewriting to Evade Detection

CYBER ATTACKZerowl

Phishing attackers have figured out how to use a normal security feature against the people it was meant to protect This article explores exploits kali.

Phishers Abuse LiveChat Support Tools to Steal Sensitive Data in New SaaS-Based Attack Tactic

Phishers Abuse LiveChat Support Tools to Steal Sensitive Data in New SaaS-Based Attack Tactic

CYBER ATTACKZerowl

A new phishing campaign is using real customer service software to steal sensitive user data. Attackers have been using LiveChat, a popular.

Payload Ransomware Uses Babuk-Inspired Encryption In Attacks On Windows and ESXi

Payload Ransomware Uses Babuk-Inspired Encryption In Attacks On Windows and ESXi

CYBER ATTACKZerowl

Payload is a new type of ransomware that is attacking businesses. It uses encryption methods that are similar to those in the leaked Babuk ransomware.

New ‘Payload’ Ransomware Uses Babuk-Style Encryption Against Windows and ESXi Systems

New ‘Payload’ Ransomware Uses Babuk-Style Encryption Against Windows and ESXi Systems

CYBER ATTACKZerowl

A new type of ransomware called "Payload" has become a major threat to businesses in many fields This article explores ransomware called payload. . It.

Microsoft Introduces AI-Powered Troubleshooting for Purview Data Lifecycle Management

Microsoft Introduces AI-Powered Troubleshooting for Purview Data Lifecycle Management

CYBER ATTACKZerowl

Microsoft has said that Microsoft Purview Data Lifecycle Management (DLM) will soon have an AI-powered troubleshooting feature This article explores.

Malicious npm Packages Deliver PylangGhost RAT in New Software Supply Chain Campaign

Malicious npm Packages Deliver PylangGhost RAT in New Software Supply Chain Campaign

CYBER ATTACKZerowl

PylangGhost, a remote access trojan, has been found for the first time on the npm registry, hidden inside two harmful JavaScript packages This article.

CISA Warns of Wing FTP Server Vulnerability Exploited in Attacks

CISA Warns of Wing FTP Server Vulnerability Exploited in Attacks

CYBER ATTACKZerowl

CISA warns that hackers can take advantage of a flaw in Wing FTP Server On March 16, 2026, a critical flaw in Wing FTP Server was added to the Known.

CISA Warns of Chrome 0-Day Vulnerabilities Exploited in Attacks

CISA Warns of Chrome 0-Day Vulnerabilities Exploited in Attacks

CYBER ATTACKZerowl

CISA warns about Chrome 0-Day vulnerabilities that can be used to hack into systems An urgent warning about two very serious zero-day security holes that.

Attackers Hijacking Legitimate Websites to Attack Microsoft Teams users

Attackers Hijacking Legitimate Websites to Attack Microsoft Teams users

CYBER ATTACKZerowl

A phishing campaign with multiple vectors that uses hacked WordPress sites to steal Microsoft Teams and Xfinity login information This article explores.

Attackers Exploit Safe Links To Hide Phishing URLs Behind Rewriting Chains

Attackers Exploit Safe Links To Hide Phishing URLs Behind Rewriting Chains

CYBER ATTACKZerowl

More and more, threat actors are using email security features against the people they are meant to protect This article explores email defenses linking.

6 Malicious Packagist Themes Ship Trojanized jQuery in the OphimCMS Supply Chain Attack

6 Malicious Packagist Themes Ship Trojanized jQuery in the OphimCMS Supply Chain Attack

CYBER ATTACKZerowl

A new supply chain attack has hit OphimCMS, a Vietnamese-language Laravel content management system that is very popular for making movie streaming sites.

Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped

Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped

CYBER ATTACKZerowl

On March 11, 2026, Stryker Corporation, a major player in medical technology, confirmed that it had been hit by a major cyberattack that disrupted its.

Top 5 this week

Page 13 of 44