Latest Articles
Operation Endgame: 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium Dismantled
Law enforcement agencies worldwide executed one of the most coordinated cybercrime takedowns in recent history.
Operation Endgame, orchestrated from Europol's headquarters in The Hague, successfully...
Critical Dell Data Lakehouse Vulnerability Allows Remote Privilege Escalation
Dell Technologies has disclosed a critical security vulnerability affecting its Data Lakehouse platform that could allow attackers with high-level privileges to escalate their access...
CISA Warns: WatchGuard Firebox Out-of-Bounds Write Vulnerability Under Active Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has escalated alert levels regarding a critical vulnerability affecting WatchGuard Firebox firewalls, adding CVE-2025-9242 to its Known...
Cross-Site Scripting Vulnerability Discovered in Citrix NetScaler ADC and Gateway
Cloud Software Group has disclosed a serious cross-site scripting vulnerability affecting thousands of organizations worldwide.
CVE-2025-12101 affects NetScaler ADC and NetScaler Gateway platforms, exposing...
Google Takes Legal Action Against ‘Lighthouse’ Phishing Kit Behind Major Cyberattacks
A significant breakthrough in the global fight against cybercrime was announced today, as Google revealed litigation aimed at dismantling "Lighthouse," a sophisticated Phishing-as-a-Service (PhaaS)...
Active Campaign Uses Cisco and Citrix 0-Days to Deploy Persistent Webshells
Advanced threat actors are actively exploiting previously undisclosed zero-day vulnerabilities in critical enterprise systems, deploying custom webshells to establish administrative access across compromised networks....
Hackers Abuse AppleScript to Deliver macOS Malware Masquerading as Zoom and Teams Updates
Researchers are tracking an uptick in macOS malware campaigns abusing AppleScript (.scpt) files to deliver stealers and fake update installers disguised as legitimate office...
MastaStealer Abuses Windows LNK Files to Run PowerShell and Bypass Defender
Researchers have identified a new MastaStealer campaign that leverages Windows shortcut (LNK) files to execute malicious PowerShell commands and deploy a C2 beacon on...
Servers Behind Hadamanthys Stealer May Have Been Seized, Admin Calls for Reinstalls
Rumors circulating in cybercrime monitoring circles indicate a significant disruption to the infrastructure supporting the Rhadamanthys information stealer, following multiple reports that its onion...
Windows Hit by Authentication Coercion That Tricks Machines into Sending Credentials
Security researchers have identified a growing wave of authentication coercion attacks that exploit Windows Remote Procedure Call (RPC) mechanisms to force systems to send their credentials...
%20(1).webp?w=218&resize=218,150&ssl=1)
%20(1).webp?w=218&resize=218,150&ssl=1)
%20(1).webp?w=218&resize=218,150&ssl=1)
%20(1)%20(1).webp?w=218&resize=218,150&ssl=1)

.webp?w=218&resize=218,150&ssl=1)
.png?w=218&resize=218,150&ssl=1)
.png?w=218&resize=218,150&ssl=1)

.png?w=218&resize=218,150&ssl=1)
.webp?w=356&resize=356,220&ssl=1)


%20(1).webp?w=356&resize=356,220&ssl=1)
%20(1).webp?w=356&resize=356,220&ssl=1)
%20(1).webp?w=356&resize=356,220&ssl=1)

%20(1).webp?w=356&resize=356,220&ssl=1)