LATEST

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

In order to steal millions of dollars in cryptocurrency, a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 is.

Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale

Transparent Tribe’s ‘Vibeware’ Shift Signals Rise of AI-Generated Malware at Industrial Scale

CYBER ATTACKZerowl

Threat actor APT36, also known as Transparent Tribe, is based in Pakistan and has switched from using well-crafted tools to a new strategy known as.

Hikvision Multiple Products Vulnerability Allows Malicious Users to Escalate Privileges

Hikvision Multiple Products Vulnerability Allows Malicious Users to Escalate Privileges

CYBER ATTACKZerowl

Hikvision Vulnerability of Multiple Products On March 5, 2026, a serious vulnerability impacting several Hikvision products was added to the Known.

Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup

Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup

CYBER ATTACKZerowl

Vulnerabilities in the Nginx UI Full system backups can be downloaded and decrypted by unauthorized attackers thanks to a recently identified critical.

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

CYBER ATTACKZerowl

Malicious Images Cause Code Execution on macOS Due to an ExifTool Flaw The long-held notion that macOS systems are intrinsically resistant to malware is.

ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions

ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions

CYBER ATTACKZerowl

In X11-based desktop environments, a recently identified Linux malware called ClipXDaemon has become a direct financial threat to cryptocurrency users.

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

DATA BREACHZerowl

For years, a Chinese-speaking threat actor has been using a combination of custom malware, open-source tools, and living-off-the-land binaries in Windows.

Chinese-Linked CL-UNK-1068 Espionage Campaign Targets Critical Infrastructure Across Asia

Chinese-Linked CL-UNK-1068 Espionage Campaign Targets Critical Infrastructure Across Asia

CYBER ATTACKZerowl

Since at least 2020, a Chinese-affiliated cyber-espionage group known as CL-UNK-1068 has been secretly attacking vital infrastructure throughout South.

Can the Security Platform Finally Deliver for the Mid-Market?

Can the Security Platform Finally Deliver for the Mid-Market?

The goal of mid-market companies is to attain security levels comparable to those of their enterprise counterparts This article explores achieving.

Apache ZooKeeper Vulnerability Allows Attackers to Access Sensitive Data

Apache ZooKeeper Vulnerability Allows Attackers to Access Sensitive Data

CYBER ATTACKZerowl

Two high-impact vulnerabilities that could result in the exposure of sensitive data and possible server impersonation attacks have been addressed by.

Top 5 this week

Page 76 of 201