Dark News Live

Category: Cyber Attacks

china-hackers

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange...
How New AI Agents Will Transform Credential Stuffing Attacks

How New AI Agents Will Transform Credential Stuffing Attacks

Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of infostealer...
malware-ransomware

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the...
cyberattack (2)

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from...
xss

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious...
cyberattack (1)

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology...
russian (1)

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information...
firefox

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad...
1 2

― Trending News

phone-hacking
Amnesty Finds Cellebrite's Zero-Day Used to Unlock Serbian Activist's Android Phone
How New AI Agents Will Transform Credential Stuffing Attacks
How New AI Agents Will Transform Credential Stuffing Attacks
cyberattack (1)
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
main
RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
ai-hackers
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
xss
Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

― Must-Read Cyber Updates

phone-hacking
Amnesty Finds Cellebrite's Zero-Day Used to Unlock Serbian Activist's Android Phone
firefox
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
ai-hackers
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
malware-ransomware
Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates
cyberattack (2)
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
russian (1)
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
Scroll to Top