LATEST

UIDAI Launches Bug Bounty Program to Boost Aadhaar Security

UIDAI Launches Bug Bounty Program to Boost Aadhaar Security

CYBER ATTACKZerowl

The Unique Identification Authority of India (UIDAI) has started its first structured bug bounty program as part of its ongoing work to make the Aadhaar.

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

ScreenConnect Vulnerability Allows Hackers to Extract Unique Machine Keys and Hijack Sessions

CYBER ATTACKZerowl

ConnectWise has sent out an urgent security alert for its ScreenConnect remote desktop software This article explores keys screenconnect vulnerability.

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

The Office of Foreign Assets Control (OFAC) at the U.S This article explores jasper sleet tradecraft. . Department of the Treasury has punished six people.

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

New Malware Campaigns Turn Network Devices Into DDoS Nodes and Crypto-Mining Bots

CYBER ATTACKZerowl

Another blow to network security. Two new types of malware have appeared that can quietly turn routers, IoT devices, and enterprise network equipment into.

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

LeakNet Scales Ransomware Operations With ClickFix Lures and Stealthy Deno Loader

CYBER ATTACKZerowl

LeakNet is a ransomware group that has been quietly working on a more dangerous way to attack This article explores leaknet ransomware. . The group used.

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Amazon Threat Intelligence says that an active Interlock ransomware campaign is taking advantage of a serious security hole that was recently made public.

ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push

ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push

CYBER ATTACKZerowl

ForceMemo is a new malware campaign that is quietly hacking hundreds of GitHub accounts and adding hidden harmful code to Python repositories, leaving.

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

FancyBear Server Exposure Reveals Stolen Credentials, 2FA Secrets and NATO-Linked Targets

CYBER ATTACKZerowl

FancyBear, a Russian state-linked hacking group, made a big mistake in operational security that gave security researchers an unusually clear picture of.

Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23

Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23

CYBER ATTACKZerowl

The GNU Inetutils telnetd daemon has a serious buffer overflow flaw. This flaw, which is tracked as CVE-2026-32746, lets an unauthenticated remote.

Top 5 this week

Page 59 of 210