CYBER ATTACK

Linux Ransomware Pay2Key Attacking Servers, Virtualization Platforms, and Cloud Environments

Linux Ransomware Pay2Key Attacking Servers, Virtualization Platforms, and Cloud Environments

CYBER ATTACKZerowl

Iranian hackers are behind Pay2Key, which has made a Linux version that is actively going after servers, virtualization hosts, and cloud workloads in.

Mirai-Based Botnets Become a Huge Threat for DDoS and Proxy Abuse

Mirai-Based Botnets Become a Huge Threat for DDoS and Proxy Abuse

CYBER ATTACKZerowl

In the past year, threats from botnets have grown quickly on the internet This article explores threats botnets grown. . A lot of the activity can be.

Linux Ransomware Pay2Key is attacking organizations like Ervers, virtualization hosts, and cloud workloads.

Linux Ransomware Pay2Key is attacking organizations like Ervers, virtualization hosts, and cloud workloads.

CYBER ATTACKZerowl

Discover how Iranian hackers have created a Linux version of Pay2Key that is actively going after servers, virtualization hosts, and cloud workloads in.

SmartApeSG ClickFix Campaign Delivers Remcos, NetSupport RAT, StealC and Sectop RAT

SmartApeSG ClickFix Campaign Delivers Remcos, NetSupport RAT, StealC and Sectop RAT

CYBER ATTACKZerowl

Using a social engineering method called ClickFix, SmartApeSG has been seen pushing several types of malware This article explores load malicious dll.

macOS Threats Are the Biggest Security Gap in 2026: How SOC Teams Close It

macOS Threats Are the Biggest Security Gap in 2026: How SOC Teams Close It

CYBER ATTACKZerowl

macOS is now a normal part of business life, especially for engineering, product, and leadership teams. If a high-access employee's Mac is hacked, it.

Firefox 149.0 is out now, and it comes with a free built-in VPN that has a monthly data limit of 50 GB.

Firefox 149.0 is out now, and it comes with a free built-in VPN that has a monthly data limit of 50 GB.

CYBER ATTACKZerowl

On March 24, 2026, Mozilla officially released Firefox 149.0 to the Release channel This article explores firefox 149 available. . The update is mostly.

Node.js Patches Multiple Vulnerabilities That Enable DoS Attacks and Process Crashes

Node.js Patches Multiple Vulnerabilities That Enable DoS Attacks and Process Crashes

CYBER ATTACKZerowl

Discover how On March 24, 2026, the Node.js project released a very important security update for the Long-Term Support (LTS) branch. This update made.

New Research Maps How Infostealer Infections Turn Into Dark Web Exposure in 48 Hours

New Research Maps How Infostealer Infections Turn Into Dark Web Exposure in 48 Hours

CYBER ATTACKZerowl

One careless download by one worker can give criminals direct access to a whole company's network in less than two days This article explores ransomware.

How Elite SOCs and MSSPs Escalate 30% Fewer Alerts with Better Threat Intelligence

How Elite SOCs and MSSPs Escalate 30% Fewer Alerts with Better Threat Intelligence

CYBER ATTACKZerowl

In a mature SOC, escalation should feel more like a knife than a shovel This article explores escalations gives tier. . When escalation rates go above.

F5 NGINX Plus and Open Source Vulnerability Allow Attackers to Execute Code Using MP4 file

F5 NGINX Plus and Open Source Vulnerability Allow Attackers to Execute Code Using MP4 file

CYBER ATTACKZerowl

A serious security hole has been found that affects both NGinX Open Source and NGINX Plus This article explores underneath ngx_http_mp4_. . There is no.

AI-Assisted OpenClaw Trap Campaign Uses Trojanized GitHub Repositories to Attack Developers and Gamers

AI-Assisted OpenClaw Trap Campaign Uses Trojanized GitHub Repositories to Attack Developers and Gamers

CYBER ATTACKZerowl

A new malware campaign has been quietly spreading through fake GitHub repositories. Tracked internally as TroyDen's Lure Factory, the campaign uses a.

Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms

Russian Initial Access Broker Sentenced to Prison for Enabling Ransomware Attacks on U.S. Firms

CYBER ATTACKZerowl

Aleksei Volkov, a 26-year-old Russian citizen, has been sentenced to 81 months in federal prison for being an Initial Access Broker (IAB). His illegal.

OpenAI to Shut Down Sora Video Platform, Pivots to Enterprise and Developer Tools

OpenAI to Shut Down Sora Video Platform, Pivots to Enterprise and Developer Tools

CYBER ATTACKZerowl

OpenAI is shutting down its Sora video creation platform This article explores openai shutting sora. . On Tuesday, CEO Sam Altman told everyone in the.

Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System

Multiple TP-Link Vulnerabilities Allow Attackers to Execute Arbitrary Commands on System

CYBER ATTACKZerowl

TP-Link has sent out an important security notice about several serious security holes This article explores nx600 routers users. . The Archer NX200.

Microsoft Entra ID Introduces Feature to Eliminate MFA Limitations

Microsoft Entra ID Introduces Feature to Eliminate MFA Limitations

CYBER ATTACKZerowl

Discover how Microsoft has said that its new External Multi-Factor Authentication (MFA) feature in Microsoft Entra ID is now available to everyone. The.

Firefox 149 Released With a Patch for 37 Security Holes That Let Attackers Attack Remotely

Firefox 149 Released With a Patch for 37 Security Holes That Let Attackers Attack Remotely

CYBER ATTACKZerowl

Discover how On March 24, 2026, Mozilla released Firefox 149, which included one of the biggest security warnings in the browser's recent history. The.

GoHarbor Vulnerability Allows Attackers to Fully Compromise Container Registry

GoHarbor Vulnerability Allows Attackers to Fully Compromise Container Registry

CYBER ATTACKZerowl

A serious security hole in GoHarbor's popular Harbor container registry is putting businesses at high risk of supply chain attacks. The flaw is known as.

Firefox 149.0 Released With Free Built-In VPN and 50GB Monthly Data

Firefox 149.0 Released With Free Built-In VPN and 50GB Monthly Data

CYBER ATTACKZerowl

The stable channel now has Firefox 149.0 from Mozilla This article explores stable channel firefox. . The update adds a lot of privacy-first features.

F5 NGINX Flaw Allows Code Execution via Malicious MP4 Files

F5 NGINX Flaw Allows Code Execution via Malicious MP4 Files

CYBER ATTACKZerowl

F5 has found a serious security hole in NGINX that could let attackers run any code they want or stop services by using a specially made MP4 file This.

Cloud-based Phishing Resumes After Tycoon2FA Disruption

Cloud-based Phishing Resumes After Tycoon2FA Disruption

CYBER ATTACKZerowl

On March 4, 2026, Europol and its partners around the world said that Tycoon2FA, a major phishing-as-a-service platform, had been technically shut down.

Passkey Architecture In Google Authenticator Poses New Cyberattack Threats

Passkey Architecture In Google Authenticator Poses New Cyberattack Threats

CYBER ATTACKZerowl

Google Authenticator's widely used passwordless architecture creates a hybrid model that combines hardware security with cloud-based key management This.

TeamPCP hackers broke into the LiteLLM PyPI package, which has been downloaded 95 million times.

TeamPCP hackers broke into the LiteLLM PyPI package, which has been downloaded 95 million times.

CYBER ATTACKZerowl

The Python Package Index (PyPI) was hacked, and a popular open-source Python library was affected This article explores python used compromised.

Hackers Exploit Magento Flaw for Remote Code Execution and Account Takeover

Hackers Exploit Magento Flaw for Remote Code Execution and Account Takeover

CYBER ATTACKZerowl

Hackers are taking advantage of a serious security hole in Magento and Adobe Commerce known as "PolyShell." The flaw lets attackers who aren't logged in.

Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths

Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths

CYBER ATTACKZerowl

Google's passkey system doesn't work like a regular hardware authenticator that only works with one device This article explores google passkey doesn.

Five harmful npm packages are aimed at crypto developers and steal wallet keys through Telegram.

Five harmful npm packages are aimed at crypto developers and steal wallet keys through Telegram.

CYBER ATTACKZerowl

Five bad packages were found that stole private wallet keys and sent them straight to a Telegram bot This article explores threat bad packages. . The.

The FCC banned consumer routers made outside the US because they could pose security risks.

The FCC banned consumer routers made outside the US because they could pose security risks.

CYBER ATTACKZerowl

The Federal Communications Commission (FCC) made a big change to its Covered List, which means that new consumer-grade network routers made in other.

TeamPCP Unleashes Iran‑Targeted CanisterWorm Kubernetes Wiper

TeamPCP Unleashes Iran‑Targeted CanisterWorm Kubernetes Wiper

CYBER ATTACKZerowl

The threat group TeamPCP has released a very dangerous version of the CanisterWorm malware that is specifically designed to destroy Iranian systems while.

New Kali Linux 2026.1 Comes With 8 Hacking Tools

New Kali Linux 2026.1 Comes With 8 Hacking Tools

CYBER ATTACKZerowl

Discover how The popular penetration testing distribution Kali Linux 2026.1 has been officially released. This is the first big update of the year. This.

Top 5 this week

Page 8 of 44