CYBER ATTACK

Microsoft App-V Exploited In Sneaky CAPTCHA Phishing Campaign

Microsoft App-V Exploited In Sneaky CAPTCHA Phishing Campaign

CYBER ATTACKZerowl

Microsoft's Application Virtualization (App-V) script, SyncAppvPublishingServer.vbs, is used as a living-off-the-land binary (LOLBIN) in a

The HoneyMyte Hacking Group Updates CoolClient Malware to Install Data Stealer for Browser Login

The HoneyMyte Hacking Group Updates CoolClient Malware to Install Data Stealer for Browser Login

CYBER ATTACKZerowl

The HoneyGovernment organizations throughout Asia and Europe are still at serious risk from the Myte threat group, also referred to as Mustang

WinRAR Path Traversal CVE-2025-8088 Actively Exploited, Google Warns Of Persistent Windows Access

WinRAR Path Traversal CVE-2025-8088 Actively Exploited, Google Warns Of Persistent Windows Access

CYBER ATTACKZerowl

A critical WinRAR vulnerability known as CVE-2025-8088 is being actively exploited by several threat actors to obtain and retain access to Windows

OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code

OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code

CYBER ATTACKZerowl

a major security alert that addresses several flaws in various iterations of its cryptographic library This article explores vulnerability openssl

Facebook, WhatsApp, and Instagram Will Test New Premium Subscriptions

Facebook, WhatsApp, and Instagram Will Test New Premium Subscriptions

CYBER ATTACKZerowl

In order to increase productivity, creativity, and AI-driven interactions, Meta is preparing to launch premium subscription tiers for its flagship

The G_Wagon npm package uses an obfuscated payload to attack users and steal their browser credentials.

The G_Wagon npm package uses an obfuscated payload to attack users and steal their browser credentials.

CYBER ATTACKZerowl

Security researchers found a risky npm package called ansi-universal-ui on January 23, 2026, which posed as a genuine user interface component

A New Watering Hole Attack Targets EmEditor Users Distributing Malware for Stealers

A New Watering Hole Attack Targets EmEditor Users Distributing Malware for Stealers

CYBER ATTACKZerowl

An advanced watering hole attack that targets users of EmEditor, a widely used Windows text editor that is preferred by developers, particularly in

Hackers Take Advantage of Teams Features to Steal Credentials Copying Microsoft Services

Hackers Take Advantage of Teams Features to Steal Credentials Copying Microsoft Services

CYBER ATTACKZerowl

Threat actors are using Microsoft Teams' legitimate features to spread malicious content that looks to be from reliable Microsoft services in a

Hackers Use Teams Features to Distribute Malicious Content That Looks Like Microsoft Services

Hackers Use Teams Features to Distribute Malicious Content That Looks Like Microsoft Services

CYBER ATTACKZerowl

Threat actors are using Microsoft Teams' legitimate features to spread malicious content that looks to be from reliable Microsoft services in a

More than 6000 SmarterTools SmarterMail servers are vulnerable to actively exploited RCE vulnerabilities.

More than 6000 SmarterTools SmarterMail servers are vulnerable to actively exploited RCE vulnerabilities.

CYBER ATTACKZerowl

Active remote code execution (RCE) attacks could target more than 6,000 SmarterMail servers that are open to the public This article explores

The Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity is published by CISA.

The Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity is published by CISA.

CYBER ATTACKZerowl

Comprehensive guidelines on Secure Connectivity Principles for Operational Technology (OT) environments have been jointly released by the National

Supply Chain Nightmare: Hackers Hijack GitHub Desktop To Distribute Trojans As Legit Updates

Supply Chain Nightmare: Hackers Hijack GitHub Desktop To Distribute Trojans As Legit Updates

CYBER ATTACKZerowl

By taking advantage of GitHub's fork system, attackers were able to take control of the official GitHub Desktop repository and distribute malware

How Threat Intelligence Will Change Cybersecurity in 2026

How Threat Intelligence Will Change Cybersecurity in 2026

CYBER ATTACKZerowl

As 2026 approaches, the cybersecurity environment is changing in ways that are actually advantageous to defenders This article explores 2026

Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

CYBER ATTACKZerowl

A new Loader-as-a-Service threat called Caminho Loader combines fileless execution, steganography, and cloud abuse to covertly spread malware over

Top 5 this week

Page 40 of 44