Androxgh0st Botnet Expands Reach, Exploiting US University Servers
New CloudSEK findings show Androxgh0st botnet evolving. Academic institutions, including UC San Diego, hit. Discover how this sophisticated threat uses RCE and web shells, and…
New CloudSEK findings show Androxgh0st botnet evolving. Academic institutions, including UC San Diego, hit. Discover how this sophisticated threat uses RCE and web shells, and…
Iran-aligned hacktivists launched DDoS attacks against 15 U.S. organizations and 19 websites in the first 24 hours after the U.S. bombed Iranian nuclear targets on…
Microsoft is rolling out a configuration update designed to address a known issue causing Windows Update to fail on some Windows 11 systems. The KB5062324…
A novel social engineering technique called “FileFix” that exploits Windows File Explorer’s address bar functionality to execute malicious commands, presenting a dangerous alternative to the…
Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands like Apple, Bank of America,…
In a significant escalation of cyber warfare in the Middle East, suspected Israeli state-sponsored threat actors operating under the name “Gonjeshke Darande” (Predatory Sparrow) successfully…
A new variant of the DRAT remote access trojan (RAT), dubbed DRAT V2, has been uncovered as part of a TAG-140 campaign targeting Indian government…
Kali Linux users face update errors due to a lost signing key in April 2025. Learn how to identify if your system is affected and…
Federal officials and private-sector security leaders said Tuesday that they are closely monitoring for cyberattacks related to the Iran conflict but thus far have not…
As threat actors grow faster, stealthier, and more persistent, the approach to pentesting needs to keep evolving. Traditional, periodic assessments no longer keep up with…
Summary 1. Scammers inject fake phone numbers into legitimate company websites (Netflix, Microsoft, Bank of America) using malicious URL parameters. 2. Cybercriminals buy Google ads…
By James Hess – CEO and Co-Founder, Unknown Cyber In today’s world, military strength is no longer defined solely by missiles and troops. The digital…