-
An exposed command-and-control server hosting a complete deployment of the BYOB (Build Your Own Botnet) framework, a sophisticated post-exploitation tool targeting Windows, Linux, and macOS systems. The discovery, made through Hunt.io’s AttackCap…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Databricks introduced BlackIce at CAMLIS Red 2025, an open-source containerized toolkit that consolidates 14 widely-used AI security tools into a single, reproducible environment. This innovation addresses critical pain points in AI red teaming by elim…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Swarmer, a sophisticated tool designed to manipulate Windows registry hives while bypassing endpoint detection systems. The tool exploits legacy Windows infrastructure to achieve persistent access without triggering traditional EDR monitoring systems t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybercriminals are exploiting Google Search Ads to distribute malware through deceptive landing pages that impersonate Apple’s official website design. The malicious ads appear prominently in Google Search results when users search for “mac…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
MicroWorld Technologies’ eScan antivirus platform fell victim to a sophisticated supply chain attack on January 20, 2026, when threat actors compromised legitimate update infrastructure to distribute multi-stage malware to enterprise and consumer…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers have identified a sophisticated jailbreak technique called Semantic Chaining that successfully bypasses safety filters in leading multimodal AI models, including Grok 4 and Gemini Nano Banana Pro. The vulnerability exploits how the…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A malicious Visual Studio Code extension posing as an AI coding assistant has been caught secretly installing a fully functional remote access tool (RAT) on developer machines. The extension looks convincing at first glance: polished branding, a profes…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
France’s government has made a decisive move to eliminate foreign videoconferencing platforms from its operations, rejecting Zoom and Microsoft Teams in favor of a domestically controlled alternative. On January 26, 2026, France announced the nat…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In the evolving landscape of cyber threats, attackers increasingly leverage Python to develop sophisticated Remote Access Trojans (RATs) that evade traditional security controls. Python’s widespread adoption and cross-platform compatibility make …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Matanbuchus is a malicious C++-based downloader that has been sold as Malware-as-a-Service (MaaS) since 2020. Initially known as a simple loader for second-stage payloads, it has steadily evolved into a flexible backdoor platform that is increasingly t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


