CYBER ATTACK

The 20 Best Tools for Monitoring Application Performance in 2026

The 20 Best Tools for Monitoring Application Performance in 2026

CYBER ATTACKZerowl

Monitoring a number of performance metrics is part of Application Performance Management (APM) This article explores apm tool monitoring. . These.

Windows 11 Emergency Update to Fix Installation Loop Issues

Windows 11 Emergency Update to Fix Installation Loop Issues

CYBER ATTACKZerowl

Microsoft sent out an urgent emergency fix for Windows 11 users who were having trouble installing the software This article explores software kb5086672.

Russian Hackers Using Remote Access Toolkit “CTRL” for  RDP Hijacking

Russian Hackers Using Remote Access Toolkit “CTRL” for RDP Hijacking

CYBER ATTACKZerowl

A new remote access tool called "CTRL" is being used to hack into Remote Desktop Protocol sessions and steal Windows system credentials This article.

Public PoC Exploit Released for nginx-ui Backup Restore Vulnerability

Public PoC Exploit Released for nginx-ui Backup Restore Vulnerability

CYBER ATTACKZerowl

A publicly known PoC exploit has made the people in charge of nginx-ui very worried This article explores backdoor nginx. . The flaw in the application's.

PNG Vulnerabilities Allow Attackers to Trigger Process Crashes, Leak Sensitive Information

PNG Vulnerabilities Allow Attackers to Trigger Process Crashes, Leak Sensitive Information

CYBER ATTACKZerowl

Researchers have found two serious security holes in libpng, which is the most popular library for working with PNG images This article explores png.

NoVoice Campaign On Google Play Puts Millions Of Android Users At Risk

NoVoice Campaign On Google Play Puts Millions Of Android Users At Risk

CYBER ATTACKZerowl

McAfee researchers have found a dangerous and important piece of Android malware called "Operation NoVoice." This advanced rootkit was hidden in more than.

New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now

New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now

CYBER ATTACKZerowl

Google has put out a very important security update for its Chrome browser This article explores security update chrome. . It fixes a zero-day flaw that.

Microsoft to Remove EXIF Data from Images Shared on Teams

Microsoft to Remove EXIF Data from Images Shared on Teams

CYBER ATTACKZerowl

Microsoft Teams will now automatically remove all EXIF metadata from any image that is uploaded to a chat or channel This article explores teams need.

HSBC India Asks Customers to use All-Uppercase Passwords

HSBC India Asks Customers to use All-Uppercase Passwords

CYBER ATTACKZerowl

Customers of HSBC India's online banking will have to type their passwords in all capital letters This article explores banking type passwords. . This.

Hackers Weaponize DOCX, RTF, JavaScript, and Python In Boeing RFQ Attack

Hackers Weaponize DOCX, RTF, JavaScript, and Python In Boeing RFQ Attack

CYBER ATTACKZerowl

A well-planned phishing scheme is going after industrial suppliers by posing as Boeing procurement officials This article explores phishing scheme going.

Hackers Use EtherRAT and EtherHiding to Hide Malware Infrastructure on Ethereum

Hackers Use EtherRAT and EtherHiding to Hide Malware Infrastructure on Ethereum

CYBER ATTACKZerowl

Discover how Sysdig says that EtherRAT is connected to a North Korean APT group because it has a lot in common with "Contagious Interview." The malware.

Hackers Push CrystalX Malware-as-a-Service Through Telegram With Stealer and RAT Features

Hackers Push CrystalX Malware-as-a-Service Through Telegram With Stealer and RAT Features

CYBER ATTACKZerowl

A new piece of malware has come out, and cybercriminals are openly selling it through private Telegram channels This article explores crystalx malware.

Hackers Hijack Hotel Booking Workflows to Scam Guests With Fake Payment Requests

Hackers Hijack Hotel Booking Workflows to Scam Guests With Fake Payment Requests

CYBER ATTACKZerowl

Discover how The Reservation Hijack Scam takes advantage of real hotel booking systems. Cybercriminals use hotel reservation systems that people trust to.

Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux

Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux

CYBER ATTACKZerowl

TeamPCP, a group of cybercriminals, has been caught putting a backdoor in the Telnyx Python SDK on PyPI This article explores backdoor telnyx python.

Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters

Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters

CYBER ATTACKZerowl

ShinyHunters, a well-known group of hackers, has taken credit for three separate data breaches that affected Cisco Systems, Inc This article explores.

CISA Alerts on Chrome Zero-Day Exploit Actively Used in Attacks

CISA Alerts on Chrome Zero-Day Exploit Actively Used in Attacks

CYBER ATTACKZerowl

The U.S This article explores flaw google chrome. . Cybersecurity and Infrastructure Security Agency (CISA) has sent out an urgent alert about a serious.

XLoader Malware Upgrades Obfuscation Tactics and Hides C2 Traffic Behind Decoy Servers

XLoader Malware Upgrades Obfuscation Tactics and Hides C2 Traffic Behind Decoy Servers

CYBER ATTACKZerowl

X loader is a type of malware that steals passwords, cookies, and other private data from computers that have been infected This article explores loader.

Windows 11 Emergency Update Fixes Installation Loop Issue

Windows 11 Emergency Update Fixes Installation Loop Issue

CYBER ATTACKZerowl

On March 31, 2026, Microsoft released an out-of-band emergency patch to fix a serious installation problem that was affecting millions of Windows 11 users.

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Entities

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Entities

CYBER ATTACKZerowl

Government agencies, the military, and operators of critical infrastructure all use TrueConf, a popular video conferencing platform This article explores.

New npm Supply Chain Attack Uses undicy-http to Deploy Screen-Streaming RAT and Browser Injector

New npm Supply Chain Attack Uses undicy-http to Deploy Screen-Streaming RAT and Browser Injector

CYBER ATTACKZerowl

The Node.js developer community has been infected by a malicious package called undicy-http This article explores linked lofygang threat. . This package.

Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft

Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft

CYBER ATTACKZerowl

The hacking group Lapsus$ has put Mercor's platform data up for auction on the dark web, where interested buyers can "make an offer." Threat actors say.

Malicious Telnyx Python Package On PyPI Targets Developer Credentials

Malicious Telnyx Python Package On PyPI Targets Developer Credentials

CYBER ATTACKZerowl

TeamPCP put two bad copies of Telnyx's official Python SDK on PyPI. The attack was set up so that it would automatically start when the library was.

Emerging Homoglyph Techniques Let Attackers Spoof Legitimate Websites

Emerging Homoglyph Techniques Let Attackers Spoof Legitimate Websites

CYBER ATTACKZerowl

Homograph attacks are common because people can't tell the difference between similar characters This article explores credentials homoglyph attacks.

CrewAI Vulnerabilities Allow Attackers to Bypass Sandboxes and Compromise Systems

CrewAI Vulnerabilities Allow Attackers to Bypass Sandboxes and Compromise Systems

CYBER ATTACKZerowl

CrewAI, a necessary tool for running multi-agent AI systems, has been found to have a number of serious security holes This article explores docker crewai.

Hackers use Telegram-based ResokerRAT, which has screenshot and persistence features.

Hackers use Telegram-based ResokerRAT, which has screenshot and persistence features.

CYBER ATTACKZerowl

ResokerRAT is a new type of remote access trojan that has been found This article explores createmutexw api malware. . It uses Telegram's bot API as its.

New ANY.RUN macOS Sandbox Helps SOC Teams Analyze Apple Threats Faster

New ANY.RUN macOS Sandbox Helps SOC Teams Analyze Apple Threats Faster

CYBER ATTACKZerowl

Virtual machines for macOS are now part of ANY.RUN's interactive sandbox platform This article explores miolab stealer macos. . Enterprise Suite users can.

Top 5 this week

Page 3 of 44