CYBER ATTACK

Fix Critical Vulnerabilities in Go 1.25.6 and 1.24.12 to Reduce the Risk of DoS and Memory Exhaustion

Fix Critical Vulnerabilities in Go 1.25.6 and 1.24.12 to Reduce the Risk of DoS and Memory Exhaustion

CYBER ATTACKZerowl

Go 1.25.6 and 1.24.12 are emergency point releases that the Go programming language team released to fix six serious security vulnerabilities This article explores release go1. . These upd

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories

CYBER ATTACKZerowl

Key AWS-owned GitHub repositories, including the popular AWS JavaScript SDK that powers the AWS Console itself, were taken over by unauthenticated attackers due to a crucial misconfigurati

NSA Issues Implementation Guidelines for Zero Trust

NSA Issues Implementation Guidelines for Zero Trust

CYBER ATTACKZerowl

The first two publications in the National Security Agency's Zero Trust Implementation Guidelines series, which offer helpful advice to assist organizations in implementing Zero Trust secu

Google Project Zero Unveils a Complex Zero-Click Exploit Chain Aimed at the Pixel 9

Google Project Zero Unveils a Complex Zero-Click Exploit Chain Aimed at the Pixel 9

CYBER ATTACKZerowl

Project Zero has revealed a complex zero-click exploit chain that targets the Pixel 9 smartphone, proving that extremely sophisticated attacks are still feasible even in the face of contem

Go Programming Language 1.26 Fixes Several Memory-Depleting Vulnerabilities

Go Programming Language 1.26 Fixes Several Memory-Depleting Vulnerabilities

CYBER ATTACKZerowl

For versions 1.25.6 and 1.24.12, the Go programming language team has released security updates that fix six serious flaws, including denial-of-service attacks, memory exhaustion, and arbi

UAT-8837 Hackers Target Organizations Using Open-Source Tools to Steal Sensitive Data

UAT-8837 Hackers Target Organizations Using Open-Source Tools to Steal Sensitive Data

CYBER ATTACKZerowl

UAT-8837 is a suspected China-nexus advanced persistent threat (APT) group that the researcher has identified This article explores exploited uat 8837. . Its primary goal is to obtain init

New Malware Targets 200,000+ U.S. Bank Employees to Steal Login Credentials

New Malware Targets 200,000+ U.S. Bank Employees to Steal Login Credentials

CYBER ATTACKZerowl

A sophisticated keylogger attack that targeted the employee store of one of the biggest banks in America has been discovered by cybersecurity researchers, putting over 200,000 employees at

New AWS Console Supply Chain Attack Sees Hackers Hijack AWS GitHub Repositories

New AWS Console Supply Chain Attack Sees Hackers Hijack AWS GitHub Repositories

CYBER ATTACKZerowl

Researchers have discovered CodeBreach, a serious flaw that allows the full takeover of important AWS GitHub repositories, endangering the AWS Console supply chain This article explores sd

Azure Identity Token Vulnerability Enables Windows Admin Center Tenant-Wide Compromise

Azure Identity Token Vulnerability Enables Windows Admin Center Tenant-Wide Compromise

CYBER ATTACKZerowl

Attackers with local administrator access were able to circumvent authentication procedures and obtain unauthorized access to any machine within the same Azure tenant due to a critical vul

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

CYBER ATTACKZerowl

The National Computer Virus Emergency Response Center (CVERC) of China has strengthened its assertion that Volt Typhoon, a threat actor, is a hoax. The agency then accused the United States o

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

CYBER ATTACKZerowl

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) The malware makes use of obfuscated JavaScript to slip past security g

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

CYBER ATTACKZerowl

It is estimated that a campaign abusing the recently revealed security flaws compromised up to 2,000 Palo Alto Networks devices. The vulnerabilities in question are a combination of privilege

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

CYBER ATTACKZerowl

A Chinese cybersecurity firm and a cyber actor based in Shanghai have been subject to sanctions by the U.S. Treasury Department's Office of Foreign Assets Control. Yin Kecheng, who is associa

U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure

U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure

CYBER ATTACKZerowl

Iranian state-sponsored or affiliated threat actors may launch cyberattacks, according to U.S. cybersecurity and intelligence agencies. According to the agencies, there is currently no proof

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

CYBER ATTACKZerowl

A new espionage campaign has been revealed by the Security Service of Ukraine (SBU or SSU). It entails enlisting young Ukrainians for illegal activities under the pretense of "quest games." A

Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

CYBER ATTACKZerowl

All advisory committee memberships have been terminated by the Department of Homeland Security. Members of the Cybersecurity and Infrastructure Security Agency's (CISA) Cyber Safety Review Bo

Top 5 Malware Threats to Prepare Against in 2025

Top 5 Malware Threats to Prepare Against in 2025

CYBER ATTACKZerowl

A common malware called Lumma is made to steal private data. Since 2022, it has been freely offered for sale on the Dark Web. A malicious program called XWorm allows hackers to take remote co

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

CYBER ATTACKZerowl

Since early January 2025, threat actors have been using the ClickFix technique to spread the NetSupport RAT remote access trojan. An updated version of the Lumma Stealer malware that uses the

THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1)

THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1)

CYBER ATTACKZerowl

Approximately 2,200 attacks are launched by hackers each day, meaning that someone is attempting to compromise a system every 39 seconds. These days, artificial intelligence (AI) systems are

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24)

CYBER ATTACKZerowl

There is more to this week's cybersecurity news than just headlines and hackers. It's about how we may not even be aware of how digital risks affect our lives. Hackers are positioning themsel

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

CYBER ATTACKZerowl

The FBI is urgently requesting public support for a worldwide investigation into sophisticated cyberattacks that target businesses and governmental organizations. Hacking groups supported by

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages

CYBER ATTACKZerowl

Cyberattacks that targeted UK retailers Marks & Spencer and Co-op in April 2025 were categorized as a "single combined cyber event" Due to a lack of sufficient information regarding the cause

Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine

Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine

CYBER ATTACKZerowl

Gamaredon and Turla, two Russian hacking groups, are working together to target and co-compete with Ukrainian entities. Both organizations are thought to be connected to the Russian Federal S

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

CYBER ATTACKZerowl

An ongoing campaign that distributes a Windows spyware that has never been documented has targeted Russian organizations. According to cybersecurity vendor Kaspersky, the activity began in Ju

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

CYBER ATTACKZerowl

Earlier this year, a major U.S. organization was the target of a suspected Chinese threat actor. The malicious activity was first discovered on April 11, 2024, and it persisted until August.

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

CYBER ATTACKZerowl

RedDelta has targeted Vietnam, Cambodia, Taiwan, Mongolia, and Myanmar. A customized version of the PlugX backdoor is allegedly delivered by the China-nexus threat actor. The Communist Party

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

CYBER ATTACKZerowl

Online, thousands of personal records purportedly connected to athletes and Saudi Games attendees have been made public. According to cybersecurity firm Resecurity, database dumps from the br

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

CYBER ATTACKZerowl

Chinese-speaking areas like Hong Kong, Taiwan, and Mainland China have been the target of numerous cyberattacks. The ValleyRAT payload is delivered by the attacks using a multi-stage loader k

Top 5 this week

Page 42 of 44