LATEST

Open Directory Leak Reveals Iran-Linked 15-Node Relay Network

Open Directory Leak Reveals Iran-Linked 15-Node Relay Network

CYBER ATTACKZerowl

Threat actors sometimes make mistakes in operational security that put their whole work environment at risk This article explores relay infrastructure.

Apple Says Older iPhones Are Open to Attacks from Coruna and DarkSword Exploit Kits

Apple Says Older iPhones Are Open to Attacks from Coruna and DarkSword Exploit Kits

Apple is telling people who still have an old version of iOS to update their iPhones to protect themselves from web-based attacks that use powerful.

AI Puzzle: Why Cant MCP Security Be Fixed?

AI Puzzle: Why Cant MCP Security Be Fixed?

Companies that are rushing to connect their LLM-powered apps to outside data sources and services using the Model Context Protocol (MCP) may be making.

ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

ThreatsDay Bulletin is back on ZeroOwl, and this week feels like the same old thing This article explores threatsday bulletin zeroowl. . Nothing loud, and.

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Cybersecurity experts have discovered a new piece of malware called Speagle that takes over the features and infrastructure of a real program called Cobra.

Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution

Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution

CYBER ATTACKZerowl

Discover how The Python Package Index (PyPI) has found a malicious Python package called pyronut that pretends to be the popular pyrogram framework and.

Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics

Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics

CYBER ATTACKZerowl

Discover how Horabot, a well-known banking trojan, is back in an active campaign that is targeting users all over Mexico. It uses a multi-stage infection.

Claude Vulnerabilities Allow Data Exfiltration and User Redirection to Malicious Sites

Claude Vulnerabilities Allow Data Exfiltration and User Redirection to Malicious Sites

CYBER ATTACKZerowl

Claude Vulnerabilities Steal Private Information and Send Users to Bad Websites Three linked flaws in Claude.ai, Anthropic's popular AI assistant, let.

CISA Tells Businesses to Protect Microsoft Intune After Stryker Breach

CISA Tells Businesses to Protect Microsoft Intune After Stryker Breach

CYBER ATTACKZerowl

The U.S This article explores misuse endpoint management. . Cybersecurity and Infrastructure Security Agency (CISA) has sent out a new warning telling.

54 EDR Killers Use BYOVD to Take Advantage of 34 Vulnerable Drivers That Are Signed and Turn Off Security

54 EDR Killers Use BYOVD to Take Advantage of 34 Vulnerable Drivers That Are Signed and Turn Off Security

A new study of endpoint detection and response (EDR) killers has found that 54 of them use a method called "bring your own vulnerable driver" (BYOVD) to.

Top 5 this week

Page 57 of 211