LATEST

Handala Hackers Use RDP and NetBird In MOIS-Linked Wiper Attacks

Handala Hackers Use RDP and NetBird In MOIS-Linked Wiper Attacks

CYBER ATTACKZerowl

The Iranian state-sponsored threat group Handala Hack is stepping up its attacks on international organizations' computers This article explores handala.

Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions

Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions

CYBER ATTACKZerowl

The Iranian hacker group Handala Hack has used remote desktop access, network tunneling, and multiple data-wiping tools at the same time to launch a.

China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years

China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years

Discover how There are more details about suspected Chinese-linked actors who quietly set up long-term access to the networks of military groups in.

CamelClone Spy Campaign Abuses Public File-Sharing Sites and Rclone in Government-Focused Attacks

CamelClone Spy Campaign Abuses Public File-Sharing Sites and Rclone in Government-Focused Attacks

CYBER ATTACKZerowl

Operation CamelClone is a complex spying operation that has been going after government agencies, defense institutions, and diplomatic bodies in many.

Attackers take over real websites to go after Microsoft Teams users.

Attackers take over real websites to go after Microsoft Teams users.

CYBER ATTACKZerowl

Attackers are using trusted infrastructure more and more to avoid detection. A new phishing campaign shows how hacked websites can be used to target.

Qihoo 360 Leaked Its Own Wildcard SSL Private Key Inside Public AI Installer

Qihoo 360 Leaked Its Own Wildcard SSL Private Key Inside Public AI Installer

CYBER ATTACKZerowl

Qihoo 360, China's biggest cybersecurity company, accidentally made its own wildcard SSL private key public by including it in the public installer for.

New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery

New ACRStealer Variant Uses Syscall Evasion, TLS C2 and Secondary Payload Delivery

CYBER ATTACKZerowl

A new version of ACRStealer has come out that is much harder to find and much more dangerous to the systems it targets This article explores acrstealer.

IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack

IBM Uncovers ‘Slopoly,’ Likely AI-Generated Malware Used in Hive0163 Ransomware Attack

CYBER ATTACKZerowl

In early 2026, IBM X-Force found a troubling new strain of malware that they think was made by AI. They called it "Slopoly" and it was used in a ransomware.

Top 5 this week

Page 64 of 207