CYBER ATTACK

Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access

Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access

CYBER ATTACKZerowl

Red Menshen has put some of the most secret digital sleeper cells ever found into the infrastructure of global telecommunications This article explores.

GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads

GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads

CYBER ATTACKZerowl

GhostClaw is a new malware campaign that is actively going after macOS users through fake GitHub repositories and AI-assisted development workflows This.

CISA warns that attackers are using the Langflow Code Injection vulnerability.

CISA warns that attackers are using the Langflow Code Injection vulnerability.

CYBER ATTACKZerowl

Langflow is a well-known open-source, low-code interface that is made just for making workflows for multi-agent AI and large language models This article.

Tax Audit Phishing Campaign Tied to Silver Fox Shifts From RATs to Python Stealers

Tax Audit Phishing Campaign Tied to Silver Fox Shifts From RATs to Python Stealers

CYBER ATTACKZerowl

Since early 2025, a China-based hacker group called Silver Fox, also known as Void Arachne, has changed the way it attacks a lot This article explores.

New Torg Grabber Stealer Moves From Telegram Exfiltration to Encrypted REST API C2

New Torg Grabber Stealer Moves From Telegram Exfiltration to Encrypted REST API C2

CYBER ATTACKZerowl

Torg Grabber is a new Malware-as-a-Service (MaaS) tool that steals credentials This article explores grabber new malware. . It started as a simple way to.

Fake Screenshot Lures Used to Spread Multi-Stage Malware to Web3 Support Staff

Fake Screenshot Lures Used to Spread Multi-Stage Malware to Web3 Support Staff

CYBER ATTACKZerowl

The threat group APT-Q-27 has been actively attacking Web3 customer support teams This article explores windows protection victim. . The attackers use.

Synology DiskStation Manager Vulnerability Allow Remote Attackers to Execute Arbitrary Commands

Synology DiskStation Manager Vulnerability Allow Remote Attackers to Execute Arbitrary Commands

CYBER ATTACKZerowl

A serious flaw in DiskStation Manager lets hackers from outside the network run any command they want This article explores telnet service vulnerability.

Microsoft Entra ID New Feature Removes MFA Limitations for Users

Microsoft Entra ID New Feature Removes MFA Limitations for Users

CYBER ATTACKZerowl

Discover how Microsoft has said that external multifactor authentication for Microsoft Entra ID is now available to everyone. This release gets rid of the.

Cisco Secure Firewall Vulnerability Allows Remote Code Execution as Root User

Cisco Secure Firewall Vulnerability Allows Remote Code Execution as Root User

CYBER ATTACKZerowl

Cisco has put out an urgent security alert about a serious flaw in its Secure Firewall Management Center (FMC) software This article explores cisco urgent.

CISA says that the Langflow code injection flaw is being used in the wild.

CISA says that the Langflow code injection flaw is being used in the wild.

CYBER ATTACKZerowl

Langflow is a well-known framework for making workflows for large language models (LLMs) This article explores langflow development environments. . CISA's.

OpenAI Launches AI Safety Bug Bounty to Detect AI-Specific Vulnerabilities

OpenAI Launches AI Safety Bug Bounty to Detect AI-Specific Vulnerabilities

CYBER ATTACKZerowl

OpenAI has started a public Safety Bug Bounty program to find AI abuse and safety issues in all of its products This article explores openai safetybug.

New Kiss Loader Malware Uses Early Bird APC Injection in Emerging Attack Campaign

New Kiss Loader Malware Uses Early Bird APC Injection in Emerging Attack Campaign

CYBER ATTACKZerowl

Kiss Loader is a new type of malware loader that uses advanced code injection methods to get into Windows systems without raising any alarms This article.

Mirai Botnet Growth Spurs Massive DDoS Attacks and Proxy Exploits

Mirai Botnet Growth Spurs Massive DDoS Attacks and Proxy Exploits

CYBER ATTACKZerowl

Botnet activity has gone up a lot in the past year. Security researchers have been keeping track of record-breaking distributed denial-of-service (DDoS).

Fake npm Install Messages Hide RAT Malware in New Open Source Supply Chain Campaign

Fake npm Install Messages Hide RAT Malware in New Open Source Supply Chain Campaign

CYBER ATTACKZerowl

Through the npm package registry, a new software supply chain campaign is going after developers This article explores packages attack. . Security.

Important NVIDIA Security Holes Allow RCE and DoS attacks

Important NVIDIA Security Holes Allow RCE and DoS attacks

CYBER ATTACKZerowl

NVIDIA has put out its March 2026 security bulletins, which warn of several security holes in its AI and infrastructure products This article explores.

Important Ivanti EPMM Security Flaws Let remote code run

Important Ivanti EPMM Security Flaws Let remote code run

CYBER ATTACKZerowl

Two serious zero-day flaws in Ivanti Endpoint Manager Mobile (EPMM) let people run code remotely without having to log in. The flaws are in parts that run.

Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts

Linux Ransomware Pay2Key Targets Servers, Virtualization Hosts

CYBER ATTACKZerowl

In the wild, the Pay2Key I2 variant was first seen in late August 2025 This article explores systems ransomware. . The malware shows that there is a.

Synology DSM Vulnerability Allows Remote Command Execution by Attackers

Synology DSM Vulnerability Allows Remote Command Execution by Attackers

CYBER ATTACKZerowl

Synology has put out an important security update to fix a serious flaw in its DiskStation Manager (DSM) software This article explores synology important.

Microsoft Releases Guidance to Detect and Defend Against Trivy Supply Chain Attack

Microsoft Releases Guidance to Detect and Defend Against Trivy Supply Chain Attack

CYBER ATTACKZerowl

A complicated supply chain attack that targets Aqua Security's well-known vulnerability scanner, Trivy This article explores trivy affected tools. . The.

LeakBase Hacker Forum Admin Arrested by Russian Authorities

LeakBase Hacker Forum Admin Arrested by Russian Authorities

CYBER ATTACKZerowl

The Russian police have arrested the person they think is the head of LeakBase This article explores cybercrime possible takedown. . The forum was a big.

IDrive for Windows Vulnerability Allows Privilege Escalation Attacks

IDrive for Windows Vulnerability Allows Privilege Escalation Attacks

CYBER ATTACKZerowl

A new security flaw in the IDrive Cloud Backup Client for Windows is causing a lot of worry This article explores security flaw idrive. . The flaw, which.

Fake security alerts for VS Code on GitHub were used to spread malware in a large phishing campaign.

Fake security alerts for VS Code on GitHub were used to spread malware in a large phishing campaign.

CYBER ATTACKZerowl

A big phishing campaign is going after software developers on GitHub This article explores vs code official. . People post fake security alerts for Visual.

Studies Show That Infostealer Infections Can Cause Dark Web Leaks in Less Than 48 Hours

Studies Show That Infostealer Infections Can Cause Dark Web Leaks in Less Than 48 Hours

CYBER ATTACKZerowl

Discover how Infostealer malware works much faster. On a Tuesday afternoon, an employee might download pirated software. By Thursday morning, the dark web.

A flaw in the Cisco Secure Firewall lets remote code run as root.

A flaw in the Cisco Secure Firewall lets remote code run as root.

CYBER ATTACKZerowl

Cisco has released important security updates to fix a serious flaw in its Secure Firewall Management Center (FMC) software that could let hackers take.

Node.js fixes a lot of security holes. Causing DoS attacks and crashes

Node.js fixes a lot of security holes. Causing DoS attacks and crashes

CYBER ATTACKZerowl

The Long-Term Support (LTS) branch was updated to version 20.20.2 on March 24, 2026 This article explores vulnerability affects node. . It fixes seven.

AI-Powered OpenClaw Trap Lures Developers with GitHub Repos That Have Been Hacked

AI-Powered OpenClaw Trap Lures Developers with GitHub Repos That Have Been Hacked

CYBER ATTACKZerowl

Netskope Threat Labs has found a huge malware campaign called "TroyDen's Lure Factory." The campaign spreads a custom LuaJIT info-stealer through more.

Top 5 this week

Page 7 of 44