Storm-2603 group exploits SharePoint flaws and uses a custom C2 framework, AK47 C2, with HTTP- and DNS-based variants named AK47HTTP…
CISA releases Thorium, an open-source tool for malware and forensic analysis, now available to analysts in government, public, and private…
Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware. Microsoft researchers uncovered a…
Hackers exploit a critical vulnerability, tracked as CVE-2025-5394 (CVSS score of 9.8), in the Alone WordPress theme to hijack sites.…
Critical flaws in Dahua cameras let hackers take control remotely. The vendor has released patches, users should update firmware asap.…
Apple addressed a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users. Apple released security updates…
PyPI warns of phishing emails from noreply@pypj[.]org posing as "[PyPI] Email verification" to redirect users to fake package sites. PyPI…
FBI Dallas seized 20 BTC from Chaos ransomware affiliate "Hors," tied to cyberattacks on Texas firms, on April 15, 2025.…
Hackers exploited a SAP NetWeaver bug to deploy upgraded Auto-Color Linux malware in an attack on U.S. chemicals firm. Cybersecurity…
Orange, France’s largest telecom provider, reported a cyberattack on one of its internal systems, impacting its operations in Europe and…
This website uses cookies.