LATEST

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

DATA BREACHZerowl

A new series of attacks that take advantage of an unpatched Windows shortcut vulnerability have been connected to a threat actor with ties to China. Between September and October of 2025, Eur

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

CYBER ATTACKZerowl

The National Computer Virus Emergency Response Center (CVERC) of China has strengthened its assertion that Volt Typhoon, a threat actor, is a hoax. The agency then accused the United States o

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

OpenAI ChatGPT Atlas web browser susceptible to prompt injection attack. Attack disguises malicious instructions to look like a URL, but that Atlas treats as high-trust 'user intent' text. Pr

Bridging the Remediation Gap: Introducing Pentera Resolve

Bridging the Remediation Gap: Introducing Pentera Resolve

In addition to identifying risk, the objective is to take continuous, large-scale action on it. Security operations teams, which are already overburdened, are frequently tasked with consolida

Beware the Hidden Costs of Pen Testing

Beware the Hidden Costs of Pen Testing

Pen testing aids businesses in ensuring the security of their IT systems, but it should never be applied universally. Conventional methods can be inflexible, cost your company money and time,

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

CYBER ATTACKZerowl

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) The malware makes use of obfuscated JavaScript to slip past security g

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

DATA BREACHZerowl

A bulletin about persistent cyberattacks targeting unpatched Cisco IOS XE devices in the nation was released by the Australian Signals Directorate (ASD). According to the intelligence agency,

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser were made available by Apple on Friday. Two security vulnerabilities that have reportedly been exp

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

DATA BREACHZerowl

ClickFix attacks require the user to resolve a challenge or issue within the browser. By copying malicious code from the page clipboard and executing it locally, they deceive users into execu

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Two then-zero-day security holes in Cisco and Citrix products were exploited by an advanced threat actor. Amazon's MadPot honeypot network detected the attacks. The activity resulted in the d

Top 5 this week

Page 190 of 202