News
GPUBreach Attack Could Lead to Full System Takeover and Root Shell Access
1+ day, 20+ hour ago (340+ words) Scheduled for presentation at the IEEE Symposium on Security & Privacy in 2026, University of Toronto researchers revealed how manipulating GPU memory can lead to a full CPU root shell. Previously, GPU Rowhammer attacks primarily caused localized data corruption, such as slightly…...
Git Hub-Backed Malware Spread via LNK Files in South Korea
2+ day, 19+ hour ago (598+ words) Hackers are abusing Windows shortcut files and Git Hub to run a stealthy, multi'stage malware campaign against organizations in South Korea. The operation chains LNK files, Power Shell, and Git Hub APIs to deliver surveillance tools while blending into normal…...
Threat Actors Exploit Log Me In Resolve, Screen Connect in Phishing Campaigns
2+ day, 1+ hour ago (646+ words) Sophos" Managed Detection and Response (MDR) teams first saw this activity in April 2025, with most malicious activity clustered in October'November 2025. More than 80 organizations were affected, largely in the US and spanning multiple sectors. The core objective of the campaign is…...
North Korea's Modular Malware Strategy Hides Attribution, Defies Takedowns
2+ day, 20+ hour ago (634+ words) North Korea's cyber program is shifting from monolithic "families" to a modular, portfolio-style malware ecosystem designed to survive exposure, frustrate attribution, and keep operations running under constant pressure. Years of sanctions, coordinated law-enforcement pressure, and rapid public disclosure of campaigns…...
Infrastructure Engineer Pleads Guilty to Locking 254 Windows Servers at Former Employer
5+ day, 20+ hour ago (378+ words) Daniel Rhyne, a 59-year-old former core infrastructure engineer, pleaded guilty on April 1, 2026, to federal hacking and extortion charges. He admitted to locking out administrators and sabotaging systems at his former New Jersey-based employer in an attack that began in November…...
Kimsuky Uses Malicious LNK Files to Drop Python Backdoor
5+ day, 20+ hour ago (488+ words) Kimsuky is using multi-stage malicious LNK files to deploy a Python-based backdoor, adding new intermediate scripts while keeping the final payload logic largely unchanged. The campaign abuses Windows Task Scheduler, Dropbox, and bundled Python runtimes to evade detection and maintain…...
TP-Link Router Flaws Allowed Attackers to Launch Do S Attacks and Cause Crashes
6+ day, 49+ min ago (523+ words) TP-Link has recently addressed a batch of severe vulnerabilities affecting the Tapo C520 WS security camera system. Security cameras are critical pieces of equipment for home and business safety, making device stability a top priority. Users must apply the latest firmware…...
RFQ Malware Campaign Uses DOCX, RTF, JS, and Python
6+ day, 21+ hour ago (714+ words) Hackers are abusing DOCX, RTF, Java Script, Power Shell, and Python to deliver an in'memory Cobalt Strike beacon in a stealthy spear'phishing campaign that impersonates Boeing procurement under the tag NKFZ5966 PURCHASE. The operation chains six stages, relies heavily on living'off'the'land…...
Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones
1+ week, 1+ hour ago (319+ words) The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding a severe vulnerability in the PX4 Autopilot system. This critical flaw could allow malicious actors to completely take over unmanned aerial vehicles (UAVs) and drones used across vital…...
Exposed Server Leaks The Gentlemen Ransomware Toolkit, Credentials, and Ngrok Tokens
1+ week, 2+ day ago (472+ words) A fully operational The Gentlemen ransomware toolkit on an exposed server, revealing victim credentials, ngrok tokens, and a complete pre-encryption playbook. This led them to an unauthenticated HTTP server at 176. 120. 22[.]127: 80, hosted by Russian bulletproof provider Proton66 OOO, exposing 126 files across 18 subdirectories…...