CYBER ATTACK

Open VSX Vulnerability lets malicious extension go live

Open VSX Vulnerability lets malicious extension go live

CYBER ATTACKZerowl

A flaw in the Open VSX extension marketplace made its new pre-publish scanning pipeline very weak This article explores flaw open vsx. . The problem.

New Silver Fox Campaign Uses Tax-Related Phishing Scams to Target Japanese Businesses

New Silver Fox Campaign Uses Tax-Related Phishing Scams to Target Japanese Businesses

CYBER ATTACKZerowl

Discover how At least since 2023, Silver Fox has been around. At first, the group only went after people who spoke Chinese. Then they moved into Southeast.

Hackers use phishing ZIP files to send PXA Stealer to steal money from banks and other financial institutions.

Hackers use phishing ZIP files to send PXA Stealer to steal money from banks and other financial institutions.

CYBER ATTACKZerowl

A new wave of cyberattacks is making banks and other financial institutions very worried This article explores cyberattacks making. . Threat actors are.

VoidLink Rootkit Exploits eBPF and Kernel Modules For Stealth On Linux

VoidLink Rootkit Exploits eBPF and Kernel Modules For Stealth On Linux

CYBER ATTACKZerowl

VoidLink is a Linux malware framework that runs in the cloud and uses a rare hybrid architecture to stay hidden on infected systems This article explores.

Red Hat Warns of Malware Code Embedded in Popular Linux Tool Allow Unauthorized Access to Systems

Red Hat Warns of Malware Code Embedded in Popular Linux Tool Allow Unauthorized Access to Systems

CYBER ATTACKZerowl

Red Hat has sent out a serious security warning about bad code This article explores red hat code. . It was found in newer versions of the "xz".

CISA Adds Aqua Security Trivy Scanner Flaw to KEV Catalog

CISA Adds Aqua Security Trivy Scanner Flaw to KEV Catalog

CYBER ATTACKZerowl

The Cybersecurity and Infrastructure Security Agency (CISA) has added a serious flaw in Aqua Security's Trivy scanner to its Known Exploited.

GhostClaw Malware Powered by AI Hits macOS and Steals Passwords

GhostClaw Malware Powered by AI Hits macOS and Steals Passwords

CYBER ATTACKZerowl

GhostClaw or Ghost loader is a growing malware campaign for macOS This article explores ghostclaw sneaky threat. . The infection follows a multi-step.

Silver Fox Phishing Campaign Shifts From RATs To Python Stealers

Silver Fox Phishing Campaign Shifts From RATs To Python Stealers

CYBER ATTACKZerowl

The infamous cybercrime group Silver Fox, which is based in China, has changed its methods This article explores silver fox cybercrime. . Instead of using.

Red Hat Warns of Malware Embedded in Popular Linux Tool Allowing Unauthorized Access

Red Hat Warns of Malware Embedded in Popular Linux Tool Allowing Unauthorized Access

CYBER ATTACKZerowl

Researchers found a complex supply chain attack that was aimed at the popular xz compression tool This article explores linux distributions compromised.

New Windows Error Reporting Vulnerability Lets Attackers Escalate to Gain SYSTEM Access

New Windows Error Reporting Vulnerability Lets Attackers Escalate to Gain SYSTEM Access

CYBER ATTACKZerowl

A new look at a local privilege escalation flaw in the Windows Error Reporting (WER) service makes it easy for hackers to get full SYSTEM access This.

New Kiss Loader Malware Targets Systems With Early Bird APC Injection

New Kiss Loader Malware Targets Systems With Early Bird APC Injection

CYBER ATTACKZerowl

Kiss Loader is a loader written in Python that is still being worked on This article explores kiss loader loader. . Researchers first noticed it on March.

Fake Cloudflare CAPTCHA Pages Spread Infiniti Stealer Malware on macOS Systems

Fake Cloudflare CAPTCHA Pages Spread Infiniti Stealer Malware on macOS Systems

CYBER ATTACKZerowl

Infiniti Stealer is a new piece of Mac malware that tricks people into clicking on fake Cloudflare human verification pages This article explores malware.

Important Citrix NetScaler and Gateway Weaknesses Allow Remote Attackers to Expose Confidential Data

Important Citrix NetScaler and Gateway Weaknesses Allow Remote Attackers to Expose Confidential Data

CYBER ATTACKZerowl

Cloud Software Group has sent out an important security bulletin that talks about two new security holes that have been found This article explores cloud.

ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services Remotely

ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services Remotely

CYBER ATTACKZerowl

The Internet Systems Consortium (ISC) has put out an important security advisory to let network administrators know about a serious security hole This.

The Claude Chrome Extension 0-Click Vulnerability lets attackers silently add prompts to websites.

The Claude Chrome Extension 0-Click Vulnerability lets attackers silently add prompts to websites.

CYBER ATTACKZerowl

A serious zero-click vulnerability in Anthropic's Claude Chrome Extension put more than 3 million users at risk of silent prompt-injection attacks This.

Anthropics leaked drafts show off a powerful new AI model called Claude Mythos.

Anthropics leaked drafts show off a powerful new AI model called Claude Mythos.

CYBER ATTACKZerowl

Anthropic accidentally made highly sensitive internal documents public, which showed that there is a powerful AI model that hasn't been released yet This.

Phishing Attack Pushes Malware Using Fake VS Code Alerts On GitHub

Phishing Attack Pushes Malware Using Fake VS Code Alerts On GitHub

CYBER ATTACKZerowl

Attackers are using GitHub Discussions to spread false warnings about security holes This article explores attackers using github. . The threat actors are.

ISC Warns of Critical Kea DHCP Flaw Causing Remote Service Crashes

ISC Warns of Critical Kea DHCP Flaw Causing Remote Service Crashes

CYBER ATTACKZerowl

The Internet Systems Consortium has put out a security warning about a serious flaw in its Kea DHCP server This article explores flaw kea dhcp. . If an.

Hackers Use Fake NPM Install Alerts To Distribute RAT Malware In Open Source Ecosystem

Hackers Use Fake NPM Install Alerts To Distribute RAT Malware In Open Source Ecosystem

CYBER ATTACKZerowl

Researchers at ReversingLabs have found a new operation This article explores attack ghost campaign. . The "Ghost campaign" is the name of this new wave.

NVIDIA flaws that are very important Allows RCE and DoS attacks

NVIDIA flaws that are very important Allows RCE and DoS attacks

CYBER ATTACKZerowl

The March 2026 security updates have been released to fix a number of holes in both enterprise and AI software systems. The most worrying problem in this.

New ClickFix Attack Uses Windows Run Dialog Box and macOS Terminal to Spread Malware

New ClickFix Attack Uses Windows Run Dialog Box and macOS Terminal to Spread Malware

CYBER ATTACKZerowl

Discover how The ClickFix social engineering method has come back with a lot of power. It tricks people into running harmful commands that quietly put.

Leak Bazaar Turns Stolen Business Data Into a Structured Criminal Market

Leak Bazaar Turns Stolen Business Data Into a Structured Criminal Market

CYBER ATTACKZerowl

On March 25, 2026, a hacker group called "Snow" from SnowTeam put up an ad on the Russian-speaking TierOne (T1) cybercrime forum This article explores.

The VoidLink Rootkit hides deep inside Linux systems by using eBPF and kernel modules.

The VoidLink Rootkit hides deep inside Linux systems by using eBPF and kernel modules.

CYBER ATTACKZerowl

Discover how VoidLink is a Linux malware framework that runs in the cloud and is written in Zig. It has a modular command-and-control structure with more.

IDrive for Windows Vulnerability Let Attackers Escalate Privileges

IDrive for Windows Vulnerability Let Attackers Escalate Privileges

CYBER ATTACKZerowl

The IDrive Cloud Backup Client for Windows has a serious local privilege escalation flaw that has been found. When the flaw is successfully used, an.

Top 5 this week

Page 6 of 44