PCPJack malware exploits 5 CVEs to spread across cloud systems.
Steals credentials from Docker, Kubernetes, AWS and more, exfiltrating via Telegram while moving laterally across networks.
Steals credentials from Docker, Kubernetes, AWS and more, exfiltrating via Telegram while moving laterally across networks.
PAN-OS flaw "CVE-2026-0300" exploited for unauthenticated RCE with root access.
Attacks began April 9, achieved within a week, followed by espionage and lateral movement by April 29.
Attacks began April 9, achieved within a week, followed by espionage and lateral movement by April 29.
Three PyPI packages uploaded July 16–22, 2025 delivered ZiChatBot malware on Windows and Linux.
The malware uses Zulip APIs as C2 and persists via registry and cron.
The malware uses Zulip APIs as C2 and persists via registry and cron.
12 vulnerabilities in the vm2 Node.js library enable sandbox escape and arbitrary code execution.
Flaws (CVSS up to 10.0) affect versions up to 3.11.1; patches released through 3.11.2.
Flaws (CVSS up to 10.0) affect versions up to 3.11.1; patches released through 3.11.2.
A Mirai-based botnet dubbed xlabs_v1 is exploiting exposed #Android Debug Bridge (ADB) services on port 5555 to hijack IoT devices.
It enables 21 DDoS attack methods and uses bandwidth profiling to tier attacks, targeting game servers.
It enables 21 DDoS attack methods and uses bandwidth profiling to tier attacks, targeting game servers.
84% of cyberattacks now blend in using legitimate tools, not malware, across 700,000 incidents, according to Bitdefender’s Cristian Iordache.
Up to 95% of access to risky tools is unnecessary, quietly expanding attack surfaces.
Up to 95% of access to risky tools is unnecessary, quietly expanding attack surfaces.
Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants.
Needle crypto-stealer C2 analysis: API key embedded in plain text inside the Rust malware unlocked 1,932 victims and the operator's withdrawal config.
Handala hacking collective 'compromised' secure US navy phones, updated target bank for Resistance Axis
The most recent breach comes after leaks involving US military personnel, high-ranking authorities, and Israeli regime officials.
#TGITM @TheGhostITM
The most recent breach comes after leaks involving US military personnel, high-ranking authorities, and Israeli regime officials.
#TGITM @TheGhostITM
TCLBANKER, a previously undocumented Brazilian banking trojan, is targeting 59 banking, fintech, and #cryptocurrency platforms.
The malware spreads through #WhatsApp Web and Microsoft Outlook, using DLL side-loading, keylogging, and fake credential overlays to evade detection and steal banking credentials.
The malware spreads through #WhatsApp Web and Microsoft Outlook, using DLL side-loading, keylogging, and fake credential overlays to evade detection and steal banking credentials.
A new Linux backdoor “PamDOORa” is being sold on the cybercrime forum after its price dropped from $1,600 to $900.
The PAM-based malware enables persistent SSH access, steals credentials, and tampers with authentication logs on compromised systems.
The PAM-based malware enables persistent SSH access, steals credentials, and tampers with authentication logs on compromised systems.
QLNX, a previously undocumented #Linux RAT, is targeting developers and DevOps systems to steal npm, PyPI, AWS, Kubernetes, Docker, and CI/CD credentials.
The malware uses fileless execution, PAM backdoors, eBPF rootkits, and 58 remote commands to maintain covert access and hijack software supply chains.
The malware uses fileless execution, PAM backdoors, eBPF rootkits, and 58 remote commands to maintain covert access and hijack software supply chains.
The Iraqi Communications and Media Commission announced that Telegram's activity has officially resumed after the platform committed to complying with the country's laws and regulations.
❤1
Cyberattack by “Children Of Gaza” on Ari Cohen Urban Development Company in occupied Jerusalem
The hacker group “Children Of Gaza” has carried out a cyberattack targeting Ari Cohen, a company active in architecture and urban planning in occupied Jerusalem. The group described Ari Cohen as one of the key firms involved in construction projects in the occupied territories.
#TGITM @TheGhostITM
The hacker group “Children Of Gaza” has carried out a cyberattack targeting Ari Cohen, a company active in architecture and urban planning in occupied Jerusalem. The group described Ari Cohen as one of the key firms involved in construction projects in the occupied territories.
#TGITM @TheGhostITM
❤2