Researchers at the University of Toronto have unveiled a significant cybersecurity vulnerability that fundamentally shifts…
Tag: attacks
Sophisticated Lua-Based Malware "LucidRook" Deployed in Targeted Attacks Against Taiwanese NGOs and Universities by UAT-10362
A previously undocumented and highly sophisticated threat cluster, now identified as UAT-10362, has been linked…
Iranian Cyber Actors Intensify Attacks on U.S. Critical Infrastructure, Targeting Operational Technology Devices
A stark warning has been issued by leading U.S. cybersecurity and intelligence agencies, including the…
New RowHammer Attacks Unleashed Against High-Performance GPUs Threaten Privilege Escalation and Full System Compromise, Bypassing IOMMU Protections.
A groundbreaking academic investigation has unveiled a new generation of RowHammer attacks specifically engineered to…
North Korean State-Sponsored Hackers Exploit GitHub for Command-and-Control in Multi-Stage Attacks Against South Korean Entities
Threat actors, strongly suspected of being associated with the Democratic People’s Republic of Korea (DPRK),…
China-Aligned Cyber Espionage Group TA416 Intensifies Attacks on European and Middle Eastern Diplomatic Entities
A sophisticated China-aligned threat actor, identified as TA416, has significantly escalated its cyber espionage operations,…
Microsoft Warns of Sophisticated WhatsApp Malware Campaign Leveraging VBS, Cloud Services, and Living-Off-The-Land Techniques in Multi-Stage Attacks
A new, highly sophisticated cyber campaign, first detected in late February 2026, has prompted a…
Pro-Ukrainian Group Bearlyfy Escalates Cyber Attacks on Russian Entities, Deploying New GenieLocker Ransomware
Since its emergence in the threat landscape in January 2025, the pro-Ukrainian cyber group known…
Russian-Linked TA446 Leverages DarkSword Exploit Kit in Targeted iOS Attacks, Prompting Urgent Apple Warnings
A sophisticated and targeted email campaign, attributed with high confidence to the Russian state-sponsored threat…
Open Source Under Siege: A Cascade of Supply Chain Attacks Threatens Software Integrity
The open-source software ecosystem, a cornerstone of modern technology, is facing an unprecedented wave of…
