LATEST

Google Rushes Emergency Chrome Update to Fix Three High-Severity Security Flaws

Google Rushes Emergency Chrome Update to Fix Three High-Severity Security Flaws

CYBER ATTACKZerowl

Three high-severity flaws in Google's Chrome browser have been fixed with an urgent security update that could put users at significant risk This article.

Anthropic claims that 16 million Claude queries were used by Chinese AI companies to replicate the model.

Anthropic claims that 16 million Claude queries were used by Chinese AI companies to replicate the model.

On Monday, Anthropic announced that it had discovered "industrial-scale campaigns" carried out by DeepSeek, Moonshot AI, and MiniMax, three artificial.

The largest data breach in U.S. history, Conduent, occurred when a ransomware group stole 8 TB of data.

The largest data breach in U.S. history, Conduent, occurred when a ransomware group stole 8 TB of data.

CYBER ATTACKZerowl

Millions of people received notification letters about the Conduent Data Breach, as the ransomware group claimed that eight terabytes had been stolen in.

Spitting Cash: ATM Jackpotting Attacks Surged in 2025

Spitting Cash: ATM Jackpotting Attacks Surged in 2025

Banks seem to have forgotten about those big metal boxes full of cash that are positioned all over the place, known as ATMs, despite spending years.

An AI-Armed Amateur Hacked More Than 600 FortiGate Devices

An AI-Armed Amateur Hacked More Than 600 FortiGate Devices

Hundreds of FortiGate instances were breached at scale by a financially motivated threat actor with limited technical expertise using generative.

North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

North Korean Threat Actors Leverage Fake IT Worker Campaigns and Contagious Interview Tactics

CYBER ATTACKZerowl

Discover how North Korean nation-state threat actors have been conducting a two-pronged operation in which they embed fictitious employees inside.

New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

New Phishing Framework Starkiller Proxies Real Login Pages to Bypass MFA

CYBER ATTACKZerowl

Recently, a very complex phishing framework called Starkiller surfaced, giving attackers a cutting-edge way to get around multi-factor authentication and.

New MIMICRAT Custom RAT Uncovered in Sophisticated Multi-Stage ClickFix Campaign

New MIMICRAT Custom RAT Uncovered in Sophisticated Multi-Stage ClickFix Campaign

CYBER ATTACKZerowl

A sophisticated new cyber campaign has been discovered that uses a trick called "ClickFix" to spread a unique remote access trojan called MIMICRAT This.

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users

CYBER ATTACKZerowl

Users in the North America region have reported frequent 504 gateway timeout errors when trying to authenticate into MFA-protected services, prompting.

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

DATA BREACHZerowl

With a new attack campaign delivering multiple new strains of custom malware, the nation-state threat group MuddyWater is not wasting any time in stepping.

Top 5 this week

Page 2 of 111