Latest Articles

Operation Endgame: 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium Dismantled

Law enforcement agencies worldwide executed one of the most coordinated cybercrime takedowns in recent history. Operation Endgame, orchestrated from Europol's headquarters in The Hague, successfully...

Critical Dell Data Lakehouse Vulnerability Allows Remote Privilege Escalation

Dell Technologies has disclosed a critical security vulnerability affecting its Data Lakehouse platform that could allow attackers with high-level privileges to escalate their access...

CISA Warns: WatchGuard Firebox Out-of-Bounds Write Vulnerability Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has escalated alert levels regarding a critical vulnerability affecting WatchGuard Firebox firewalls, adding CVE-2025-9242 to its Known...

Cross-Site Scripting Vulnerability Discovered in Citrix NetScaler ADC and Gateway

Cloud Software Group has disclosed a serious cross-site scripting vulnerability affecting thousands of organizations worldwide. CVE-2025-12101 affects NetScaler ADC and NetScaler Gateway platforms, exposing...
Lighthouse Phishing Kit

Google Takes Legal Action Against ‘Lighthouse’ Phishing Kit Behind Major Cyberattacks

A significant breakthrough in the global fight against cybercrime was announced today, as Google revealed litigation aimed at dismantling "Lighthouse," a sophisticated Phishing-as-a-Service (PhaaS)...

Active Campaign Uses Cisco and Citrix 0-Days to Deploy Persistent Webshells

Advanced threat actors are actively exploiting previously undisclosed zero-day vulnerabilities in critical enterprise systems, deploying custom webshells to establish administrative access across compromised networks....
macOS malware AppleScript

Hackers Abuse AppleScript to Deliver macOS Malware Masquerading as Zoom and Teams Updates

Researchers are tracking an uptick in macOS malware campaigns abusing AppleScript (.scpt) files to deliver stealers and fake update installers disguised as legitimate office...
MastaStealer Windows LNK attack

MastaStealer Abuses Windows LNK Files to Run PowerShell and Bypass Defender

Researchers have identified a new MastaStealer campaign that leverages Windows shortcut (LNK) files to execute malicious PowerShell commands and deploy a C2 beacon on...
hadamanthys stealer servers seized

Servers Behind Hadamanthys Stealer May Have Been Seized, Admin Calls for Reinstalls

Rumors circulating in cybercrime monitoring circles indicate a significant disruption to the infrastructure supporting the Rhadamanthys information stealer, following multiple reports that its onion...
Authentication coercion

Windows Hit by Authentication Coercion That Tricks Machines into Sending Credentials

Security researchers have identified a growing wave of authentication coercion attacks that exploit Windows Remote Procedure Call (RPC) mechanisms to force systems to send their credentials...

Cyber Security Headlines

Cyber Attacks

Data Breach

Cyber AI