-
Handala Hack is an Iranian state-linked destructive actor that combines old-school RDP-heavy intrusions with new tools like NetBird and AI-assisted wipers to devastate victim networks rapidly. Handala Hack is an online persona operated by Void Manticor…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Poland’s National Centre for Nuclear Research recently experienced a targeted cyberattack aimed at its IT infrastructure. Security teams successfully thwarted the intrusion before malicious actors could compromise critical systems or access sensi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new cyber espionage campaign dubbed Operation CamelClone, targeting government and strategic sectors across several geopolitically significant regions. The campaign abuses legitimate tools and public file‑sharing platforms to deliver malware and stea…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Zach Rice, the original creator of the widely popular secret scanning tool Gitleaks, has officially launched its successor, Betterleaks. Sponsored by Aikido Security, this new open-source project aims to be a faster, smarter, and highly configurable re…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
RondoDox is a Mirai‑style botnet that has quickly evolved into a highly automated exploitation engine, chaining 174 vulnerabilities with large‑scale use of compromised residential IP infrastructure. This explosive growth widens the global attack surfa…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Every day, billions of people rely on postal and courier services to deliver everything from handwritten letters to high value online orders.The rapid growth of global e-commerce has made parcel delivery services a critical part of everyday life. Accor…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Tenable Research recently uncovered “LeakyLooker,” a critical set of nine novel cross-tenant vulnerabilities within Google Looker Studio that enabled attackers to silently exfiltrate or modify sensitive data across various Google Cloud Platform service…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Ransomware group Hive0163 is experimenting with a likely AI-generated malware framework, dubbed “Slopoly,” marking a visible shift toward AI-assisted tooling in attacks. While the malware itself is simple, its use shows how quickly threat actors can no…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Fake FileZilla downloads are being used to deliver a stealthy Remote Access Trojan (RAT) through a multi‑stage loader, putting careless downloaders at high risk of compromise. Attackers have set up a fake website that closely copies the look and layou…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research reveals that a new ACRStealer variant is now being actively deployed as a final payload by HijackLoader, using low‑level syscalls, AFD-based networking, TLS C2, and flexible secondary payload delivery to evade detection and maximize data t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


