DATA BREACH

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

DATA BREACHZerowl

The people behind Storm-1175 are stepping up their attacks with quick campaigns that are meant to spread the Medusa ransomware This article explores.

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

DATA BREACHZerowl

A global cybercrime group is going after public-facing Web apps by taking advantage of React2Shell flaws to steal passwords and other private information.

Visibility Is the First Step to Securing Shadow AI

Visibility Is the First Step to Securing Shadow AI

DATA BREACHZerowl

Most security teams can't keep up with how quickly AI is being used This article explores ai agents treated. . Max Imbiel says that companies can use the.

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

Venom Stealer MaaS Platform Commoditizes ClickFix Attacks

DATA BREACHZerowl

Cybercriminals are selling "VenomStealer" as a MaaS platform on forums and networks This article explores venom stealer using. . The software lets.

AI Has Forced a Rethink of Data Security

AI Has Forced a Rethink of Data Security

DATA BREACHZerowl

Companies must adapt to using AI in order to stay competitive, but this puts private data at risk by exposing it to new workflows and outside apps This.

Precision Attack Compromises Axios NPM Package

Precision Attack Compromises Axios NPM Package

DATA BREACHZerowl

Axios is the most popular JavaScript HTTP client library, and it gets more than 400 million downloads a month on NPM This article explores attack axios.

AI Systems Are Redefining the Enterprise Attack Surface

AI Systems Are Redefining the Enterprise Attack Surface

DATA BREACHZerowl

AI is becoming a tool for making decisions in businesses, and hackers are already using it This article explores organizations ask attack. . Brendan.

Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam

Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam

DATA BREACHZerowl

Since last August, attackers have been pretending to be recruiters from Palo Alto Networks. People who have been affected are asked to pay between $400.

4 major risks of AI and how to reduce them

4 major risks of AI and how to reduce them

DATA BREACHZerowl

Discover how AI agents are now a part of business workflows and can get to sensitive systems like code repositories and financial platforms. At the same.

Attackers Abuse LiveChat to Phish Credit Card, Personal Data

Attackers Abuse LiveChat to Phish Credit Card, Personal Data

DATA BREACHZerowl

Attackers have found yet another innovative way to conduct phishing attacks by abusing the customer support platform LiveChat, using real-time social.

'BlackSanta' EDR Killer Targets HR Workflows

'BlackSanta' EDR Killer Targets HR Workflows

DATA BREACHZerowl

Threat actors who speak Russian are targeting HR workflows with an attack campaign that uses steganographic image files to hide a malicious tool that can.

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

DATA BREACHZerowl

For years, a Chinese-speaking threat actor has been using a combination of custom malware, open-source tools, and living-off-the-land binaries in Windows.

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Malicious Next.js Repos Target Developers Via Fake Job Interviews

DATA BREACHZerowl

In a campaign linked to North Korea's fictitious job-recruitment scams, attackers are targeting developers with malicious Next.js repositories to carry.

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

DATA BREACHZerowl

With a new attack campaign delivering multiple new strains of custom malware, the nation-state threat group MuddyWater is not wasting any time in stepping.

Supply Chain Attack Secretly Installs OpenClaw for Cline Users

Supply Chain Attack Secretly Installs OpenClaw for Cline Users

DATA BREACHZerowl

Someone wasn't keeping up with OpenClaw's rapid spread This article explores openclaw installations attack. . This week, cybersecurity vendors observed a.

Supply Chain Attack Embeds Malware in Android Devices

Supply Chain Attack Embeds Malware in Android Devices

DATA BREACHZerowl

Researchers have discovered new malware that infects every app on compromised systems and gives attackers virtually unfettered remote access to them This.

Poland Energy Resists Attack on Solar and Wind Facilities

Poland Energy Resists Attack on Solar and Wind Facilities

DATA BREACHZerowl

Despite its failure, the late-last-year attack on Poland's energy sector was the first significant assault on decentralized energy resources (DERs), such.

ClickFix Attacks Deliver ModeloRAT by Abusing the DNS Lookup Command

ClickFix Attacks Deliver ModeloRAT by Abusing the DNS Lookup Command

DATA BREACHZerowl

By employing a new command to get around security and force users to infect their own devices with malware, in this case a remote access Trojan (RAT) for.

Operation DoppelBrand: Weaponizing Fortune 500 Brands

Operation DoppelBrand: Weaponizing Fortune 500 Brands

DATA BREACHZerowl

Discover how Fortune 500 companies have been the target of a widespread phishing campaign by an elusive, profit-driven threat actor known as GS7, which.

Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy — Again

Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy — Again

DATA BREACHZerowl

Another sobering reminder of the success hackers have been having with edge devices in general, a new round of serious flaws in an Ivanti product has.

Microsoft Office Zero-Day Actively Exploited in Targeted Cyberattacks

Microsoft Office Zero-Day Actively Exploited in Targeted Cyberattacks

DATA BREACHZerowl

A critical security feature bypass vulnerability affecting Office applications has been revealed by Microsoft, and there is proof that it is being

Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware

Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware

DATA BREACHZerowl

Kaspersky: a tool related to espionage was distributed as a result of a zero-day exploit of a Google Chrome vulnerability. CVE-2025-2783 (CVSS score:

Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months

Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months

DATA BREACHZerowl

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider. The hacking group's expansion to the country beyond Southeast Asi

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch

DATA BREACHZerowl

According to Symantec, three Chinese threat groups have turned a zero-day vulnerability into a weapon. Attackers have targeted government agencies in the United States, South America, and an

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

DATA BREACHZerowl

Search engine optimization (SEO) fraud has been linked to the Chinese-speaking cybercrime group UAT-8099. Microsoft Internet Information Services (IIS) servers are the intended target of the

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

DATA BREACHZerowl

Tick, a suspected Chinese cyberespionage actor, is also referred to as Bronze Butler, Daserf, REDBALDKNIGHT, Stalker Panda, and Stalker Taurus. It is well-known for its widespread targeting o

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

DATA BREACHZerowl

A new series of attacks that take advantage of an unpatched Windows shortcut vulnerability have been connected to a threat actor with ties to China. Between September and October of 2025, Eur

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

DATA BREACHZerowl

A bulletin about persistent cyberattacks targeting unpatched Cisco IOS XE devices in the nation was released by the Australian Signals Directorate (ASD). According to the intelligence agency,

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

DATA BREACHZerowl

ClickFix attacks require the user to resolve a challenge or issue within the browser. By copying malicious code from the page clipboard and executing it locally, they deceive users into execu

Top 5 this week

Page 1 of 2