LATEST

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Researchers reveal information about a recent campaign that made use of websites that distribute cracked software. The campaign makes use of a new iteration of the Count loader, a stealthy an

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Customers of Amazon Web Services (AWS) have been the target of an ongoing campaign that uses compromised Identity and Access Management (IAM) credentials to facilitate cryptocurrency mining.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

A maximum-severity zero-day vulnerability in Cisco's AsyncOS software has been made known to users. A China-nexus advanced persistent threat (APT) actor known as UAT-9686 has been actively us

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

GENERALZerowl

A serious vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency. The vulnerability is known as a "embe

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

A security vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency. The vulnerability, known as CVE-2023

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

Jewelbug, a threat actor, has been concentrating more on European government targets. The cluster is being monitored by Check Point Research under the moniker Ink Dragon. It is estimated that

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

Kaspersky: An APT group connected to China tainted DNS queries in order to distribute the MgBot backdoor. The group primarily targeted particular victims with adversary-in-the-middle (AitM) a

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

GENERALZerowl

A number of cyberattacks against governmental organizations in Japan and Southeast Asia have been linked to an undiscovered China-aligned threat cluster. The use of a diverse custom toolkit,

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

The likelihood of small and medium-sized businesses (SMBs) being targeted has increased. Large companies investing in cybersecurity and refusing to pay ransoms are the reasons behind this shi

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28, a Russian state-sponsored threat actor, has been linked to a credential-harvesting campaign that targets UKR[. ]net users. The activity builds on earlier findings from the cybersecurit

Top 5 this week

Page 207 of 207