loader image
Masjesu Botnet Peddles DDoS-for-hire

The Masjesu botnet peddles DDoS attacks by leveraging a stealthy network of compromised IoT devices, as revealed by cybersecurity researchers. Emerging in 2023, Masjesu operates as a DDoS-for-hire service, marketed via Telegram, targeting routers, gateways, and other IoT hardware across varied architectures. Its ability to infiltrate a wide spectrum of devices underscores a growing threat […]

Adobe Finally Patches Acrobat Zero-Day

Adobe finally patches an Acrobat and Reader zero-day vulnerability, which attackers have exploited for several months, with the release of a critical fix. The vulnerability, tracked as CVE-2026-34621, posed significant risks to users of these widely used software tools. Released on April 11, the patch aims to secure systems against potential threats that had remained […]

North Korea’s APT37 Uses Facebook to Deploy RokRAT

North Korea’s APT37 uses Facebook as a strategic tool in a recent cyber campaign, according to cybersecurity researchers. Known as ScarCruft, this group engages in social engineering by friending targets on Facebook. They exploit this connection to deploy RokRAT, a potent remote access trojan. This multi-stage attack showcases the evolving tactics of APT37, as they […]

Storm Infostealer Hijacks Sessions, Bypasses MFA

The new ‘Storm’ infostealer hijacks sessions by bypassing local decryption, opting instead to send browser data directly to attacker-controlled servers. This method enables server-side decryption, effectively allowing hackers to intercept and hijack user sessions without needing to crack passwords or bypass multi-factor authentication. Cybersecurity firm Varonis highlights the risk posed by such tactics, which exploit […]

Claude Clone Site Spreads PlugX RAT

A newly discovered Claude clone site poses a significant cybersecurity threat by distributing the PlugX remote access Trojan (RAT). This malicious operation cleverly mimics the legitimate Anthropic software installation. Hackers employ a technique known as DLL sideloading to deceive users and deploy the covert malware onto targeted systems. After installation, the malware efficiently cleans up […]

Basic-Fit Confirms Million-Member Data Theft

Basic-Fit confirms data theft involving personal information of about a million gym members, marking a significant cybersecurity breach. Unauthorized access compromised names, addresses, dates of birth, and bank details, though passwords remain secure. This breach raises concerns about data safety protocols in widespread use in the fitness industry. The attack highlights vulnerabilities in standard data […]

VIPERTUNNEL Backdoor Hides in Fake DLL

The vipertunnel backdoor is a new threat infiltrating enterprise networks by hiding within a fake DLL file laced with multiple layers of obfuscation. This Python-based malware leverages a SOCKS5 proxy tunnel to connect with a remote command-and-control server, enabling attackers to maintain their hold on compromised systems persistently. The backdoor’s stealthy presence is facilitated by […]

OpenAI Hit by North Korea-Linked Axios Hack

OpenAI has been hit by a major cybersecurity breach linked to North Korean actors, impacting its supply chain. The incident has raised alarms within the tech industry, prompting immediate actions from the artificial intelligence company. OpenAI discovered that a macOS code signing certificate, essential for validating software authenticity and security, may have been compromised as […]

APT37 Uses Facebook to Deliver RokRAT

North Korean hacking group APT37 uses Facebook to execute a sophisticated social engineering campaign. This cyber espionage endeavor involved targeting unwary users by forming connections through friend requests on the social media platform. Threat actors leveraged these newly established relationships to deploy RokRAT, a remote access trojan that can exfiltrate sensitive data. APT37, also known […]

Adobe Patches Acrobat Reader 0-Day Under Attack

Adobe has swiftly issued a critical security patch to address a zero-day vulnerability in Acrobat Reader that is being actively exploited in the wild. Identified as CVE-2026-34621, this flaw allows attackers to execute arbitrary code on compromised systems by exploiting the Prototype Pollution weakness. The vulnerability, highlighted under CWE-1321, arises from improper control over object […]

Chaos Botnet Targets Cloud, Adds SOCKS Proxy

The Chaos botnet targets cloud environments as it evolves to exploit misconfigured cloud deployments, say cybersecurity researchers. Expanding from its historical focus on routers and edge devices, this variant increasingly penetrates cloud platforms, Darktrace revealed in a recent report. Cybersecurity experts have raised alarms over the rapid adaptability of the Chaos botnet, which now includes […]

13-Year-Old ActiveMQ Flaw Lets Hackers Run Code

Researchers have uncovered a critical vulnerability in Apache ActiveMQ Classic, a 13-year-old ActiveMQ bug that allows hackers to execute arbitrary commands remotely. This remote code execution flaw, undetected for over a decade, threatens the integrity and security of systems using the message broker. Apache ActiveMQ Classic, a widely adopted tool for facilitating communication between software […]