CYBER ATTACK

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

CYBER ATTACKZerowl

Evasive Panda, a threat actor with ties to China, targeted a government agency and a religious group in Taiwan. They were infected by the threat actor using a post-compromise toolset known as

Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign

Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign

CYBER ATTACKZerowl

As part of a "highly sophisticated espionage campaign" in mid-September 2025, Chinese state-sponsored threat actors employed artificial intelligence (AI) to plan automated cyberattacks. The G

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

CYBER ATTACKZerowl

A European Union diplomatic organization has been the target of a threat actor with ties to China, MirrorFace. The hacking team has never before targeted an organization in the area. It is de

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities

CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities

CYBER ATTACKZerowl

Emergency Response for Computers A new malicious email campaign that targets government agencies, businesses, and military organizations has been described by Team of Ukraine. The campaign ha

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

CYBER ATTACKZerowl

It has been determined that the threat cluster is an extension of an ongoing campaign carried out by a threat actor with ties to Belarus. An obfuscated macro is executed when a malicious Exce

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign

CYBER ATTACKZerowl

According to JPCERT/CC, APT-C-60 delivered the SpyGlace backdoor using a lure with a job application theme. The attack made use of trustworthy services like Bitbucket, Google Drive, and StatC

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

CYBER ATTACKZerowl

The Python-based cloud attack tool AndroxGh0st is well-known for specifically targeting Laravel applications. It has previously taken advantage of vulnerabilities in PHPUnit, the Laravel Fram

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

CYBER ATTACKZerowl

Numerous Google Chrome extensions have been found to steal private information. Apple consents to pay $95 million to resolve a protracted class action lawsuit in the United States. A proof-of

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

CYBER ATTACKZerowl

There have been many disturbing developments in the field of cybersecurity over the past week. Cybercriminals have been actively taking advantage of a serious flaw in Cleo's file transfer sof

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

CYBER ATTACKZerowl

Even the most intelligent of us are being duped by AI-powered scams, sneaky malware is hiding in well-known software, and hackers are breaking into the setups of other hackers. On the other h

Top 5 this week

Page 44 of 44