CYBER ATTACK

RondoDox Botnet Expands to 174 Exploits, Leveraging Residential IP Infrastructure at Scale

RondoDox Botnet Expands to 174 Exploits, Leveraging Residential IP Infrastructure at Scale

CYBER ATTACKZerowl

RondoDox is a newly tracked botnet that has quietly grown into one of the most worrying threats seen in the last few months This article explores rondodox.

Researchers Reveal Technique to Decrypt and Exploit Cortex XDR BIOC Rules

Researchers Reveal Technique to Decrypt and Exploit Cortex XDR BIOC Rules

CYBER ATTACKZerowl

Cybersecurity researchers have found a serious way for attackers to get around behavioral detections in Palo Alto Networks' Cortex XDR. They can do this.

Handala Hackers Use RDP and NetBird In MOIS-Linked Wiper Attacks

Handala Hackers Use RDP and NetBird In MOIS-Linked Wiper Attacks

CYBER ATTACKZerowl

The Iranian state-sponsored threat group Handala Hack is stepping up its attacks on international organizations' computers This article explores handala.

Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions

Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions

CYBER ATTACKZerowl

The Iranian hacker group Handala Hack has used remote desktop access, network tunneling, and multiple data-wiping tools at the same time to launch a.

CamelClone Spy Campaign Abuses Public File-Sharing Sites and Rclone in Government-Focused Attacks

CamelClone Spy Campaign Abuses Public File-Sharing Sites and Rclone in Government-Focused Attacks

CYBER ATTACKZerowl

Operation CamelClone is a complex spying operation that has been going after government agencies, defense institutions, and diplomatic bodies in many.

Attackers take over real websites to go after Microsoft Teams users.

Attackers take over real websites to go after Microsoft Teams users.

CYBER ATTACKZerowl

Attackers are using trusted infrastructure more and more to avoid detection. A new phishing campaign shows how hacked websites can be used to target.

Qihoo 360 Leaked Its Own Wildcard SSL Private Key Inside Public AI Installer

Qihoo 360 Leaked Its Own Wildcard SSL Private Key Inside Public AI Installer

CYBER ATTACKZerowl

Qihoo 360, China's biggest cybersecurity company, accidentally made its own wildcard SSL private key public by including it in the public installer for.

New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery

New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery

CYBER ATTACKZerowl

A new version of ACRStealer has come out that is much harder to find and much more dangerous to the systems it targets This article explores acrstealer.

IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack

IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack

CYBER ATTACKZerowl

In early 2026, IBM X-Force found a troubling new strain of malware that they think was made by AI. They called it "Slopoly" and it was used in a ransomware.

Fake Shipment Tracking Scams Surge in MEA, Stealing Banking Data Through Real-Time Phishing

Fake Shipment Tracking Scams Surge in MEA, Stealing Banking Data Through Real-Time Phishing

CYBER ATTACKZerowl

Billions of people depend on postal and courier services every day to send everything from personal letters to online orders This article explores postal.

Fake FileZilla downloads can lead to RAT infections through a stealthy multi-stage loader.

Fake FileZilla downloads can lead to RAT infections through a stealthy multi-stage loader.

CYBER ATTACKZerowl

Researchers have found a new malware campaign that uses fake websites that look like the official FileZilla download page to spread a Remote Access Trojan.

How to Find an Affordable, Easy to Deploy PAM in 2026 (and What to Avoid)

How to Find an Affordable, Easy to Deploy PAM in 2026 (and What to Avoid)

CYBER ATTACKZerowl

You're not the only one who needs privileged access management (PAM) but has already looked at the top companies in the field and decided against them.

OpenClaw AI Agents Leaking Sensitive Data in Indirect Prompt Injection Attacks

OpenClaw AI Agents Leaking Sensitive Data in Indirect Prompt Injection Attacks

CYBER ATTACKZerowl

OpenClaw AI Agents leaking private information through indirect prompt injection Attackers can use weak default settings and prompt injection flaws to.

Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE Vulnerability

Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE Vulnerability

CYBER ATTACKZerowl

Automatic installation of Windows 11 and Server 2025 Microsoft has announced a two-phase plan to turn off the hands-free deployment feature in Windows.

Microsoft Exchange Online Mailbox Access Outage Affects Users Globally

Microsoft Exchange Online Mailbox Access Outage Affects Users Globally

CYBER ATTACKZerowl

Discover how Microsoft is looking into a service outage that is affecting Exchange Online users who are having trouble getting to their mailboxes through.

Konni APT Hijacks KakaoTalk Accounts to Spread Malware in Multi-Stage Spear-Phishing Campaign

Konni APT Hijacks KakaoTalk Accounts to Spread Malware in Multi-Stage Spear-Phishing Campaign

CYBER ATTACKZerowl

Konni APT, a threat group, has been caught running a multi-stage attack campaign that starts with targeted spear-phishing emails and ends with taking over.

Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services

Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services

CYBER ATTACKZerowl

A group of nine new cross-tenant vulnerabilities in Google Looker Studio, known as "LeakyLooker," could have let attackers run any SQL query, steal.

Betterleaks: New Open-Source Tool for Scanning Files, Directories, and Git Repositories

Betterleaks: New Open-Source Tool for Scanning Files, Directories, and Git Repositories

CYBER ATTACKZerowl

Discover how A new open-source tool for scanning secrets is called Zach Rice, who made the Gitleaks project that many people use, made Betterleaks.

Betterleaks – A New Open-Source Tool to Scan Directories, Files, and Git Repositories

Betterleaks – A New Open-Source Tool to Scan Directories, Files, and Git Repositories

CYBER ATTACKZerowl

Better leaks Scan Directories, Files, and Git Repositories with Open-Source Tool Betterleaks is a new open-source secrets scanner made by the same person.

Attackers Abuse Microsoft Teams and Quick Assist to Drop Stealthy A0Backdoor

Attackers Abuse Microsoft Teams and Quick Assist to Drop Stealthy A0Backdoor

CYBER ATTACKZerowl

Discover how A new backdoor called A0Backdoor has been found as part of a planned social-engineering campaign that takes advantage of Microsoft Teams and.

Android 17 Advanced Protection Mode to Block Malicious Service Usage

Android 17 Advanced Protection Mode to Block Malicious Service Usage

CYBER ATTACKZerowl

Advanced Protection Mode for Android 17 Google is getting ready to release Android 17, which will include a full set of new APIs and system features that.

ACRStealer Upgrades With Syscall Evasion and TLS-Based C2 In New Campaign

ACRStealer Upgrades With Syscall Evasion and TLS-Based C2 In New Campaign

CYBER ATTACKZerowl

Security researchers at Proofpoint have found that ACRStealer, a Malware-as-a-Service (MaaS), has gotten a lot of technical improvements This article.

Real-Time Phishing Campaigns Use Fake Shipment Alerts To Steal Banking Data In MEA

Real-Time Phishing Campaigns Use Fake Shipment Alerts To Steal Banking Data In MEA

CYBER ATTACKZerowl

In 2022, Statista says that more than 161 billion packages were sent around the world This article explores phishing fake shipment. . This shows that.

Indirect Prompt Injection Attacks Cause OpenClaw AI Agents to Leak Sensitive Data

Indirect Prompt Injection Attacks Cause OpenClaw AI Agents to Leak Sensitive Data

CYBER ATTACKZerowl

After a warning from China's National Computer Network Emergency Response Technical Team (CNCERT) about dangerous default settings and prompt-injection.

Google Looker Studio Vulnerabilities Enable Attackers to Exfiltrate Data from Google Services

Google Looker Studio Vulnerabilities Enable Attackers to Exfiltrate Data from Google Services

CYBER ATTACKZerowl

Google Looker Studio was affected by nine high‑impact “LeakyLooker” vulnerabilities that could have allowed attackers to exfiltrate or modify data across.

Android 17 launches Advanced Protection Mode to stop bad service exploits.

Android 17 launches Advanced Protection Mode to stop bad service exploits.

CYBER ATTACKZerowl

Android 17 is making Advanced Protection Mode a much stronger defense layer by actively blocking the use of harmful and misdeclared services, especially.

Microsoft Tracks Storm-2561 In Fake VPN Client Credential Theft Scheme

Microsoft Tracks Storm-2561 In Fake VPN Client Credential Theft Scheme

CYBER ATTACKZerowl

Microsoft says that a group of hackers it tracks as Storm-2561 is running a campaign to steal credentials by using fake VPN clients that are pushed.

Konni APT Uses Compromised KakaoTalk Accounts To Launch Multi-Stage Malware Attacks

Konni APT Uses Compromised KakaoTalk Accounts To Launch Multi-Stage Malware Attacks

CYBER ATTACKZerowl

The Konni Advanced Persistent Threat (APT) group has started a new malware distribution campaign that uses hacked KakaoTalk PC messenger accounts to.

Top 5 this week

Page 14 of 44