LATEST

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Based on evidence of active exploitation, the U.S This article explores vulnerability solarwinds web. . Cybersecurity and Infrastructure Security Agency.

Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict

Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict

CYBER ATTACKZerowl

Discover how One day after fresh hostilities broke out in the Middle East on March 1, 2026, Camaro Dragon, an advanced persistent threat group with ties.

'BlackSanta' EDR Killer Targets HR Workflows

'BlackSanta' EDR Killer Targets HR Workflows

DATA BREACHZerowl

Threat actors who speak Russian are targeting HR workflows with an attack campaign that uses steganographic image files to hide a malicious tool that can.

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Two implants known as BEARDSHELL and COVENANT have been seen to be used by the Russian state-sponsored hacking group known as APT28 to enable long-term.

AI is Modifying File-Based Security Regulations

AI is Modifying File-Based Security Regulations

AI is altering file-based security regulations According to Gartner, global information security spending is expected to reach $240 billion in 2026.

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity

CYBER ATTACKZerowl

Since early February 2026, the Iranian advanced persistent threat group known as Seedworm—also known as MuddyWater, Temp Zagros, and Static Kitten—has.

BoryptGrab Stealer Steals Browser and Crypto Wallet Data and Spreads via False GitHub Repositories

BoryptGrab Stealer Steals Browser and Crypto Wallet Data and Spreads via False GitHub Repositories

CYBER ATTACKZerowl

Through a network of phony GitHub repositories, a new data-stealing malware known as BoryptGrab has been covertly propagating throughout Windows systems.

White House Cyber Strategy Prioritizes Offense

White House Cyber Strategy Prioritizes Offense

The Trump administration released a notably hawkish vision of American cyber power that blends deregulation at home with deterrence and offense against.

Vietnam-Based Cybercrime Network Enables Fraudulent Account Signups at Scale

Vietnam-Based Cybercrime Network Enables Fraudulent Account Signups at Scale

CYBER ATTACKZerowl

Large-scale fraudulent account registration campaigns that target service providers and online platforms globally have been connected to a vast cybercrime.

Top 5 this week

Page 81 of 207