CYBER ATTACK

Critical LangSmith Account Takeover Vulnerability Puts Users at Risk

Critical LangSmith Account Takeover Vulnerability Puts Users at Risk

CYBER ATTACKZerowl

Critical LangSmith Account Takeover Weakness Miggo Security researchers have found a serious flaw in LangSmith, known as CVE-2026-25750, that could let.

Authorities are cracking down on 45,000 malicious IPs that are powering ransomware attacks.

Authorities are cracking down on 45,000 malicious IPs that are powering ransomware attacks.

CYBER ATTACKZerowl

45000 Bad IPs Are Being Cracked Down on by Authorities Law enforcement agencies from 72 countries have successfully shut down more than 45,000 malicious.

A malicious npm campaign pretends to be Solara Executor in order to steal Discord and crypto wallet information.

A malicious npm campaign pretends to be Solara Executor in order to steal Discord and crypto wallet information.

CYBER ATTACKZerowl

Discover how A new cybersecurity threat has come from the npm ecosystem, where hackers were able to hide a complex information stealer inside packages.

Loblaw Data Breach: Hackers Gain Access to IT Network and Customer Data

Loblaw Data Breach: Hackers Gain Access to IT Network and Customer Data

CYBER ATTACKZerowl

Loblaw Companies Limited, one of Canada's biggest stores, has revealed a data breach after noticing strange activity on part of its internal IT network.

A serious LangSmith vulnerability lets someone take over your account completely.

A serious LangSmith vulnerability lets someone take over your account completely.

CYBER ATTACKZerowl

Discover how Critical LangSmith Vulnerability Account Takeover Researchers at Miggo Security have found a serious flaw (CVE-2026-25750) in LangSmith, a.

Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server

Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server

CYBER ATTACKZerowl

Veeam Fixes Security Holes on Backup Server Backup & Replication software has received an important security update that fixes serious flaws that could.

Salesforce Warns of ShinyHunters Group Exploiting Experience Cloud Sites

Salesforce Warns of ShinyHunters Group Exploiting Experience Cloud Sites

CYBER ATTACKZerowl

Salesforce Warns ShinyHunters: There is a serious threat campaign going on right now that is going after Experience Cloud sites that are not set up.

OpenSSH GSSAPI Vulnerability Allow an Attacker to Crash SSH Child Processes

OpenSSH GSSAPI Vulnerability Allow an Attacker to Crash SSH Child Processes

CYBER ATTACKZerowl

Many Linux distributions installed the GSSAPI Key Exchange patch on top of their OpenSSH packages, which had a major security hole This article explores.

Metasploit Pro 5.0.0 Released With Powerful New Modules and Critical Enhancements

Metasploit Pro 5.0.0 Released With Powerful New Modules and Critical Enhancements

CYBER ATTACKZerowl

Metasploit Pro 5.0.0 is out now This article explores metasploit pro centralized. . As hackers keep using new weaknesses to attack, the need for ongoing.

Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Complete Root Takeover

Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Complete Root Takeover

CYBER ATTACKZerowl

Nine serious security holes have been found in AppArmor, which is a widely used mandatory access control framework for Linux This article explores kernel.

Chrome Zero-Day Vulnerabilities Actively Exploited in the Wild to Execute Malicious Code

Chrome Zero-Day Vulnerabilities Actively Exploited in the Wild to Execute Malicious Code

CYBER ATTACKZerowl

Google has put out an emergency security update for its Chrome browser after confirming that two high-severity zero-day vulnerabilities are being used in.

TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East

TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East

CYBER ATTACKZerowl

Discover how The conflict around Iran is now shaping cyber espionage across the region. Since the start of the war in late February 2026, security.

PowerShell and PsExec Used To Steal Data Before INC Ransomware Attack

PowerShell and PsExec Used To Steal Data Before INC Ransomware Attack

CYBER ATTACKZerowl

Recently, Huntress's cybersecurity researchers saw threat actors using INC ransomware after a complicated process of stealing data This article explores.

Handala Expands Destructive Cyber Operations Beyond Israeli Targets

Handala Expands Destructive Cyber Operations Beyond Israeli Targets

CYBER ATTACKZerowl

Handala, an Iranian-linked threat group, is behind a growing number of destructive wiper attacks that are threatening businesses in the US and Israel This.

Authorities shut down a malicious proxy network that was used to spread malware.

Authorities shut down a malicious proxy network that was used to spread malware.

CYBER ATTACKZerowl

A coordinated international law enforcement operation has taken down SocksEscort, a large malicious proxy service that cybercriminals used to hide their.

Six Malicious Packagist Themes Deliver Trojanized jQuery Payloads

Six Malicious Packagist Themes Deliver Trojanized jQuery Payloads

CYBER ATTACKZerowl

Discover how Security researchers have found six bad Composer packages on Packagist that claim to be real OphimCMS themes. OphimCMS is a Laravel-based.

New OpenSSH Flaw in GSSAPI Authentication Can Trigger SSH Process Crashes

New OpenSSH Flaw in GSSAPI Authentication Can Trigger SSH Process Crashes

CYBER ATTACKZerowl

A newly discovered vulnerability in OpenSSH is putting several Linux distributions at risk, allowing attackers to crash SSH processes with a single.

Ericsson US Discloses Data Breach as Hackers Steal Employee and Customer Data

Ericsson US Discloses Data Breach as Hackers Steal Employee and Customer Data

CYBER ATTACKZerowl

Ericsson Inc., the US branch of Swedish telecommunications giant Ericsson, has revealed a data breach that put private financial and personal information.

Critical MediaTek Flaw Allows Attackers to Extract Android PINs in Under a Minute

Critical MediaTek Flaw Allows Attackers to Extract Android PINs in Under a Minute

CYBER ATTACKZerowl

If someone with physical access to an Android device has the MediaTek Dimensity 7300 chipset, they could get the phone's lock PIN, decrypt stored data.

Security filters cant stop phishing emails made by AI.

Security filters cant stop phishing emails made by AI.

CYBER ATTACKZerowl

Cybersecurity experts have seen a huge rise in phishing campaigns that use artificial intelligence to get around regular email security filters This.

Microsoft Copilot Email and Teams Summarization Vulnerability Enables Phishing Attacks

Microsoft Copilot Email and Teams Summarization Vulnerability Enables Phishing Attacks

CYBER ATTACKZerowl

AI assistants have quickly changed the way things are done every day, making it easier for teams to handle overflowing inboxes, client communications, and.

A serious flaw in MediaTek lets hackers steal Android phone PINs in less than a minute.

A serious flaw in MediaTek lets hackers steal Android phone PINs in less than a minute.

CYBER ATTACKZerowl

The MediaTek Dimensity 7300 chipset has a serious security hole that lets a physical attacker get device PINs, decrypt on-device storage, and steal.

Splunk RCE Vulnerability Allows Attackers to Execute Arbitrary Shell Commands

Splunk RCE Vulnerability Allows Attackers to Execute Arbitrary Shell Commands

CYBER ATTACKZerowl

Splunk RCE Vulnerability A serious security advisory has been sent out to let users know about a high-severity flaw that affects both Enterprise and Cloud.

Paloalto Cortex XDR Broker Vulnerability Attackers to Obtain and Modify Sensitive Information

Paloalto Cortex XDR Broker Vulnerability Attackers to Obtain and Modify Sensitive Information

CYBER ATTACKZerowl

Vulnerability in Paloalto Cortex XDR Broker A security warning has been sent out about a new flaw that affects the Cortex XDR Broker Virtual Machine (VM).

Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks

Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks

CYBER ATTACKZerowl

Threat actors are using legitimate Remote Monitoring and Management (RMM) tools more and more to get into corporate networks and stay there for a long.

Ericsson US Discloses Data Breach – Hackers Stolen Employees and Customers Data

Ericsson US Discloses Data Breach – Hackers Stolen Employees and Customers Data

CYBER ATTACKZerowl

The Ericsson Data Breach A Swedish telecommunications multinational's U.S. subsidiary has revealed a data breach that put the personal information of.

Cisco IOS XR Software Vulnerability Allow Attacker to Execute Commands as Root

Cisco IOS XR Software Vulnerability Allow Attacker to Execute Commands as Root

CYBER ATTACKZerowl

cisco-ios-xr-software-vulnerability Cisco has sent out a high-severity security advisory to warn businesses about two serious privilege-escalation flaws.

BeatBanker Malware Targets Crypto Wallets With Audio-Based Persistence

BeatBanker Malware Targets Crypto Wallets With Audio-Based Persistence

CYBER ATTACKZerowl

Discover how The BeatBanker malware campaign has been found recently. It uses a unique method to stay on Android devices. This malware mostly affects.

Top 5 this week

Page 15 of 44