Pulling Back the Curtain on Warlock's Next Act
Pulling Back the Curtain on Warlock’s Next Act The ransomware group known as Warlock, also tracked as Storm-2603 and Gold Salem, has been quietly continuing its campaigns targeting edge devices an...
Pulling Back the Curtain on Warlock’s Next Act The ransomware group known as Warlock, also tracked as Storm-2603 and Gold Salem, has been quietly continuing its campaigns targeting edge devices an...
Microsoft Store Outlook Add-in Hijacked 🚨 The AgreeTo add-in for Outlook has been hijacked and transformed into a phishing kit that has stolen over 4,000 Microsoft account credentials. Originally ...
🚨 Fake Recruiter Campaign Alert! The ReversingLabs research team has uncovered a new branch of a fake recruiter campaign orchestrated by the notorious Lazarus Group, a North Korean hacking team. T...
Crazy Ransomware Gang Abuses Employee Monitoring Tool in Attacks 🚨 A member of the Crazy ransomware gang is exploiting legitimate employee monitoring software and the SimpleHelp remote support too...
Conduent Case Unveiled: Volvo Reports Third-Party Compromise 🚨 On February 11, 2026, news broke that Volvo Group North America reported a significant compromise related to the ongoing Conduent ran...
🚨 Pride Month Phishing Alert! Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials. Although P...
New Linux Botnet SSHStalker Uses Old-School IRC for C2 Comms 🚀 A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-contro...
Man Tricked Hundreds of Women into Handing Over Snapchat Security Codes 🚨 Last week, 27-year-old Kyle Svara from Oswego, Illinois, admitted to hacking women’s Snapchat accounts across the US. Betw...
Largest Multi Agency Cyber Operation Launched Against APT Threats 🚀 The Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA) have announced a significant mu...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2025-6830 Xpoda Türkiye Informati...
Quick Howto - Extract URLs from RTF Files Malicious RTF (Rich Text Format) documents are back in the news with the exploitation of CVE-2026-21509 by APT28. The malicious RTF documents BULLETEN_H.d...
Password Guessing Without AI: How Attackers Build Targeted Wordlists Passwords remain a persistent point of tension between usability and security. Attackers have long recognized this behavioral p...
How the GNU C Compiler Became the Clippy of Cryptography The creators of security software have encountered an unlikely foe in their attempts to protect us: modern compilers. Today’s compilers boi...
European Commission Investigates Cyberattack 🚨 The European Commission is currently investigating a cyberattack that compromised its mobile device management system. On January 30, signs of the at...
BeyondTrust Security Update 🚨 BeyondTrust has patched a critical pre-auth flaw in its Remote Support and Privileged Remote Access (PRA) products that could allow attackers to execute code remotely...
🚨 Beware of Fake 7-Zip Downloads! 🚨 A convincing lookalike of the popular 7-Zip archiver site has been serving a trojanized installer that silently converts victims’ machines into residential prox...
LocalGPT – A Secure Local Device Focused AI Assistant Built in Rust In an era where AI assistants like ChatGPT and Claude dominate cloud infrastructures, exposing user data to remote breaches, a n...
UK Construction Firm Hit by Prometei Botnet 🚧 In January 2026, a UK construction firm discovered a digital “tenant from hell” hiding on its Windows Server. Security experts from the eSentire Threa...
Italian University La Sapienza Offline After Cyber Attack 🚨 Rome’s La Sapienza University has been severely impacted by a cyberattack that disrupted its IT systems and caused significant operation...
DOGE May Have Misused Social Security Data, DOJ Admits 🚨 The Trump administration recently acknowledged in court documents that operatives from the Department of Government Efficiency (DOGE) may h...