Trending

AI-Assisted Phishing Campaign Exploits Browser Permissions to Capture Victim Data

Cyble analyzes an AI-driven phishing campaign that abuses browser permissions to capture victims images and exfiltrate the data to attacker-controlled Telegram bots.

The Ultimate Guide to Dark Web Monitoring in 2026: Protect Your Data Before Attackers Strike

Dark web intelligence helps organizations detect stolen credentials, leaked data, and cyber threats early, enabling faster response and stronger security.

Australia, New Zealand, Tonga, Warn of Rising INC Ransom Attacks Targeting Pacific Networks

ACSC, NCSC, and CERT Tonga warn of growing INC Ransom activity targeting healthcare and organizations across Australia, New Zealand, and Pacific states.

ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader

Cyble has identified a new Linux threat named ClipXDaemon that targets cryptocurrency users by intercepting and manipulating copied wallet addresses.

Middle East on the Brink: Iran-US-Israel Hostilities Trigger Cyber-Kinetic Conflict

Middle East faces unprecedented hybrid warfare as Iran, US, and Israel clash through cyberattacks, missile strikes, and hacktivist campaigns.

ENISA’s Updated Cybersecurity Methodology Aligns with NIS2 and EU Cybersecurity Act

ENISA’s Cybersecurity Exercise Methodology helps organizations align with NIS2 and the EU Cybersecurity Act while improving readiness and resilience.

The Week in Vulnerabilities: WordPress, BeyondTrust, and Critical ICS Bugs

Critical WordPress, BeyondTrust, Honeywell CCTV, and PUSR router vulnerabilities surfaced on underground forums, while CISA issued 8 ICS advisories impacting critical manufacturing sectors.

SURXRAT: From ArsinkRAT roots to LLM Module Downloads Signaling Capability Expansion

Cyble uncovers SURXRAT’s evolution across versions, built on ArsinkRAT code, and now downloading large LLM modules signaling an expansion of its operational capabilities.

The Week in Vulnerabilities: SolarWinds, Ivanti, and Critical ICS Exposure

Critical SolarWinds, Ivanti EPMM, Microsoft Office, and Siemens ICS vulnerabilities are being discussed on underground forums, while 15 CISA ICS advisories impacted Energy and Critical Manufacturing sectors.
Scroll to Top