Published Date All 2025-05-08 2025-05-07 2025-05-06 2025-05-05 2025-05-04 2025-05-03 2025-05-02 2025-05-01 2025-04-30 2025-04-29
Tags All .NET Malware 2020 Election Controversy Access Control Accessibility Improvements Account Takeover ACR Technology Active Directory Active_Exploitation Adobe Acrobat Reader DC Advance-Fee Fraud Advanced Persistent Threat Advanced Persistent Threat (APT) Advanced Persistent Threats (APTs) Adversarial_Attacks Adversary-in-the-Middle (AitM) Adversary-in-the-Middle (AiTM) Attacks Adyen Affiliate Recruitment Age Verification Agent Upgrade Agentic AI AI Agent Development AI Agent Security AI Agents AI Chatbots in Law Enforcement AI Content Detection AI Deception AI Detection Technologies AI Governance AI Governance and Risk Management AI in Cybercrime AI in Cybersecurity AI in Cybersecurity Defense AI in Ransomware AI Misuse AI Model Fine-tuning AI Model Rollback AI Plagiarism AI Risk Assessment and Mitigation AI Risk Mitigation AI Risks and Liability AI Safety AI Security AI Security Tools AI Tooling AI_in_Cybersecurity AI_Security AI-assisted Code Development AI-based Security AI-based Security Assessment AI-based Threats AI-driven Security AI-enabled Cybercrime AI-Enhanced Malware AI-generated bug reports AI-generated code security AI-generated Code Security AI-Generated Code Security AI-generated Deepfakes AI-Generated Scams AI-Generated Threat Detection AI-powered Application Security AI-powered Attacks AI-powered Code Review AI-powered Disinformation AI-powered Features AI-powered Phishing AI-powered Security AI-powered Social Engineering AI-related Cyberattacks AIBOM Air Gap AirPlay AirPlay Vulnerabilities AirPlay Vulnerability AirTag Accessories AitM Attack Alert Fatigue Allegations of Censorship AMSI Bypass Android Android Security Android Security Update Android_Vulnerability anonymity Anti-Evasion Techniques Anti-forensics Anti-Malware Plugin Disguise ANY.RUN Apache ActiveMQ Apache HTTP Server Apache HTTP Server Vulnerability Apache Parquet Vulnerability API Endpoint Vulnerability API Key Security API Protection API Security API Vulnerability API_Key_Leak API_Security App Security Apple Apple AirPlay Vulnerability Apple AirTags Apple Child Safety Initiatives Apple's AirPlay Application Performance Monitoring (APM) Application Security Application Security Posture Management (ASPM) APT APT (Advanced Persistent Threat) APT Attack APT Attacks APT28 APT35/Agent Serpens Arbitrary Code Execution Arbitrary File Deletion Arbitrary File Read Arbitrary File Upload Arbitrary File Write Argument Injection Artificial Intelligence Artificial Intelligence (AI) Asahi Linux AT Command Vulnerability Atril Document Viewer Attack Surface Management Authentication Authentication and Authorization Authentication Bypass Authentication Issues Authentication Methods Automation Automation in Cyberattacks AWS Security Azure Front Door (AFD) Issue Azure Security Backdoor Backdoor Access Bankruptcy Big Data Biometric Authentication Biometric Data and Regulations Bitcoin Blockchain Technology Booter and Stresser Services Booter/Stresser Services Border Security Bot Management Botnet Botnets Brand Impersonation Brazil Targeting Browser Privacy Browser Security Browser Vulnerabilities Brute Force Attacks Brute-Force Attacks Buffer Overflow Bug Bounties Bug Bounty Bug Bounty Programs Burp Suite Business Continuity Business Email Compromise (BEC) BYOD Security BYOVD Callback Phishing CAN Bus Career Advice Challenge ChatGPT ChatGPT Enterprise Child Exploitation Child Sextortion China China AI Regulation China as a Cyber Threat China as Cyber Threat China-aligned Hackers China-Aligned Threat Actor China-based Threat Actors Chinese APT Chinese Cybercriminals CHIPS and Science Act CI/CD CISA CISA Advisory CISA Budget Cuts CISA KEV Catalog CISA Layoffs and Contract Changes CISA Mission Refocusing CISA Reform CISA Warning Cisco IOS XE Cisco IOS XE Vulnerability Cl0p Ransomware (Suspected) Class Action Lawsuit Cleo Hack ClickFix Cloud Access Management Cloud Identity Security Cloud Provider Comparison Cloud Security Cloud Security Posture Management (CSPM) Cloud_Security Cloudflare Cobalt Strike Code Execution Code Injection Code_Injection Command Injection Command-line Tool Commodity Ransomware Commvault Commvault Vulnerability Compliance Conflict of Interest Confused Deputy Containers Continuous Optimization Continuous Threat Exposure Management (CTEM) Cost-Cutting Credential Harvesting Credential Protection Credential Stuffing Credential Stuffing/Brute-forcing credential theft Credential Theft Credit Card Fraud Crime-as-a-Service (CaaS) Crisis Communication Critical Infrastructure Critical Infrastructure Protection Critical Infrastructure Security Critical National Infrastructure CRLF Injection Cross-border Data Transfer Cross-Site Scripting (XSS) CrowdStrike Cryptocurrency Cryptocurrency Theft Cryptographic Agility CTF Custom Malware CVE CVE Analysis CVE Management CVE Program Funding CVE-2021-26855 CVE-2023-44221 CVE-2024-10445 CVE-2024-13943 CVE-2024-34099 CVE-2024-38475 CVE-2024-6029 CVE-2024-6030 CVE-2024-7399 CVE-2025-20173 CVE-2025-20174 CVE-2025-20175 CVE-2025-2082 CVE-2025-26647 CVE-2025-27007 CVE-2025-27363 CVE-2025-2759 CVE-2025-29953 CVE-2025-30065 CVE-2025-3248 CVE-2025-3928 Cyber Espionage Cyber Hygiene Cyber Insurance Cyber Insurance Claims Cyber Resilience Cyber Risk Management Cyberattack Cyberbullying Cybercrime Cybercrime Economics Cybersecurity Cybersecurity Assessments Cybersecurity Companies Cybersecurity Compliance Cybersecurity Exercise Cybersecurity Funding Cybersecurity Incident Response Cybersecurity Investigation Cybersecurity Investment Cybersecurity Policy Cybersecurity Readiness Cybersecurity Regulations Cybersecurity Skills Shortage Cybersecurity Training Cybersecurity Vulnerabilities Cybersecurity_Compliance_Failures Cybersecurity_Incidents Cyberwarfare dark web Dark Web Dark Web AI Tooling Dark Web Data Exposure Dark Web Marketplace Takedown darknet Darknet/Underground Forums DARPA Data Backup data breach Data Breach Data Breach (Possible) Data Breach Prevention Data Breach/Compromise Data Breaches Data Collection Data Collection Practices of AI Platforms Data Exfiltration Data Exposure Data Extortion Data Leak Data Leak Sites (DLS) Data Leakage Data Loss Prevention Data Loss Prevention (DLP) Data Poisoning Data Privacy Data Protection Data Security Data Security and Privacy Concerns Data Theft Data Theft/Scraping Data Transfer to China Data Wiping Malware Data_Exfiltration DDoS DDoS Attacks DDoS Protection DDoS-for-hire Decoding deep web Deepfakes Deepfakes in Cybercrime Default Configuration Vulnerabilities Default Passwords Delta Air Lines Denial of Service (DoS) Denial-of-Service Dependency Confusion Attacks Deserialization Vulnerability Detection Evasion Developer Training and Upskilling DevOps DevSecOps Digital Fraud Digital Risk Protection (DRP) Directory Traversal Discord Discord RAT Disinformation Disk wiping DKIM DLL DMARC DNS Hijacking DOGE DORA Compliance Drug Trafficking DShield Eavesdropping EDR Bypass Education Sector Election Security Email Authentication Email Security Email Spoofing Employee Concerns about AI Encrypted Communication Encryption End of Life End-of-Life Software End-to-End Encryption End-to-End Encryption Failure Endpoint Protection Endpoint Security Enterprise Security EPUB File Parsing Espionage Ethical Hacking Executive Exposure Exploit Exploited Vulnerabilities Exploited Vulnerability Exposure Management External Attack Surface Management (EASM) extortion Extortion Facial Recognition Technology False Positives False_Claims_Act FBI Investigation FIDO Alliance File Permission Vulnerabilities File Upload File Upload Vulnerability Financial Data Theft Financial Fraud Financial Motivation Financial Performance Financial Performance of Cybersecurity Firms Financial Restructuring Financial Sector Financial Transactions Firewall Bypass Firmware Update Flask Flutter Fraud FreeType FreeType Vulnerability FreeType_Library_Vulnerability Gartner Report GDPR GDPR Violation GenAI Generational Differences Generative AI Generative AI in Cybercrime Generative AI Security Geopolitical Cyberattacks Geopolitical Motivation GitHub GitHub Security GitHub_Security Global Entry Program GoLang Malware Google Chrome Government and Military Targets Government Cybersecurity Government Cybersecurity Budget Cuts Government Cybersecurity Initiatives Government Cybersecurity Policy Government Data Breach Government Data Security Government Funding Government Misuse of Technology Government Oversight Government Sanctions Government Security Government Surveillance Government Use Government_Contracts Group Policy GStreamer GStreamer Vulnerability H.265 Vulnerability Hacktivism Hardcoded Credentials Havoc Healthcare Data Breach Healthcare Data Compromise Heap-based Buffer Overflow Helm Charts High-Severity Vulnerabilities Higher Education Cybersecurity HIPAA Hoax Calls HTTP Toolkit HTTP/2 Rapid Reset Human Intelligence (HUMINT) Human Rights Human Trafficking Investigation Hybrid Authentication Hybrid Cloud Security Hyper-volumetric DDoS Attacks IAM (Identity and Access Management) ICS Security ICS/OT Security ICS/SCADA Attacks ICS/SCADA Security Identity and Access Management (IAM) Identity Management Identity Recovery Identity Theft Identity_and_Access_Management_(IAM) Impersonation Improper Input Validation Incident Response India India Semiconductor Industry Indian Law Industrial Control Systems (ICS) Security Influence Operations Information Sharing Information Stealer InfoStealer Infostealer Malware Initial Access Broker (IAB) Insecure Credential Storage Insider Threat Insider Threat (Potential) Insider Threats Insider_Threat Integer Overflow Intelligence Gathering International Cooperation International Crime International Cybercrime International Data Privacy Regulations International Law Enforcement Cooperation Investment Scams iOS IoT Security IP Address Identification IPv6 IPv6 Exploitation IPv6 SLAAC Spoofing IPv6 Spoofing Iranian APT Iranian Cyberespionage Iris Modem Japan Targeting Java JavaScript JavaScript API JavaScript Injection Job Cuts in Tech Job Scams Just-in-Time Access (JIT) Kerberos Keylogger Keylogging Kubernetes Security Lack of Multi-Factor Authentication Lampion Malware Langflow Large Language Model (LLM) Security Large Language Models (LLMs) Large_Language_Model_(LLM)_Security Lateral Movement Law Enforcement Law Enforcement Action Law Enforcement Operation Lawsuit Layoffs Leadership Least Privilege Least Privilege Access Legacy Systems Legal Action Legal Case Legal Settlement Legislation Linux Malware LLM LLM Security LLM_Prompt_Engineering LLM_Security_Risks Local Privilege Escalation Local Vulnerability LockBit Log Management LSB Steganography Machine Identity Security Machine Learning Machine Learning Bug macOS macOS Security Magento Malicious Attachments Malicious Software Malicious Software Update Malvertising Malware Malware Analysis Malware Deployment Malware Detection Malware Development Malware Downloader Malware-as-a-Service (MaaS) Manufacturing Impact Manufacturing_Facility_Cyberattack MATE Desktop MCP MCP Security Memory Management Memory Safety Mergers and Acquisitions Meta's Role in Child Safety MFA MFA Bypass Microsoft Microsoft 365 Outage Microsoft 365 Security Microsoft Azure Breach Microsoft Copilot Microsoft Edge Microsoft Entra ID Microsoft Exchange Online Microsoft Exchange Server Microsoft Exchange Server Vulnerabilities Microsoft Teams Mimikatz MinHash Mirai Botnet Misconfiguration Misconfigurations Misconfigured Apache Pinot Misconfigured Database Misconfigured Security Controls Misinformation and Election Security Misinformation/Deception Mitigation Strategies MITRE ATT&CK Mobile Application Security Mobile Browser Data Collection Mobile Browser Privacy Mobile Device Security Mobile Driver's Licenses (MDLs) Mobile Phishing Mobile Security Model Context Protocol (MCP) Modular Malware Multi-Cloud Security Multi-Factor Authentication Multi-Factor Authentication (MFA) Multilingual Attack Myanmar Cybercrime Mystery Box Scams N-day Vulnerability Nation-State Actor Nation-State Actors Nation-State Cyberattacks National Security National Security Risk NATO NCSC Advisory NCSC Involvement Negotiating with Threat Actors Network Detection and Response (NDR) Network Segmentation NFC Fraud NGO Cybersecurity Node.js Non-Human Identities (NHIs) North Korean APT North Korean Cyber Espionage North Korean Cybercrime North Korean Espionage NSO Group NYDFS Cybersecurity Regulation OAuth 2.1 Obfuscation oFono Oktapus On-Premise Network Breach Ongoing_Investigation Online Abuse Online Advertising Fraud Online Anonymity Online Child Exploitation OODA Loop Open Source Open Source AI Open Source AI Security Open Source Security Open Source Software Open Source Software Security Open Source Vulnerability Open_Source_Vulnerability Operation PowerOFF Operational Technology (OT) Operational Technology (OT) Security Optigo Networks ONS NC600 Oracle VirtualBox Organized Crime OS Command Injection OSINT OTP Interception Out-of-Bounds Read Out-of-Bounds Write Outcome-Driven Metrics (ODMs) OWASP Juice Shop Parental Controls Pass-The-Hash Pass-The-Ticket Passkey Adoption Passkeys Password Management Password Management Practices Password Managers Password Reuse Password Security Password Security Research Passwordless Authentication Patch Management Patching Patching Failure Path Traversal Path Traversal Vulnerability Pegasus Pegasus Spyware Penetration Testing People Search Engines Performance Optimization Persistence PhaaS Phishing Phishing and Smishing Phishing Attacks Phishing Prevention Phishing Resistance Phishing_and_Social_Engineering Phishing-as-a-Service (PhaaS) PHP PII Exposure PIPEDA PNG PNG Image Forensics Political Loyalty over National Security Political Motivations (Alleged) Political Retribution Polymorphic Malware Poor Cyber Hygiene Poor Security Practices Post-Quantum Cryptography Post-Quantum Cryptography (PQC) PowerShell Pre-authentication PrecautionaryShutdown Privacy Privacy Concerns Privacy Risks of AI Image Generators Privacy Violation Privilege Escalation Privileged Access Management (PAM) Pro-Russia Hacktivism Proactive Security Product Announcements Product Review Productivity Prompt Injection Proof-of-Concept Exploit ProtonMail ProxyLogon Public-Private Collaboration Public-Private Partnership pytest Python Python Scripting QCMAP_ConnectionManager Quantum Computing Quantum Internet Quantum Key Distribution (QKD) RaaS Race Condition ransomware Ransomware Ransomware (Possible) Ransomware (Uncertainty) Ransomware Attack Ransomware Attack (Possible) Ransomware Attacks Ransomware_Attack_Statistics Ransomware_Groups Ransomware_Suspicion Ransomware-as-a-Service (RaaS) RCE Real ID Act Red Teaming Registered Domain Generation Algorithm (RDGA) Regulatory Compliance (GDPR, PIPL, PDPL) Regulatory Fine Remote Access Trojan Remote Access Trojan (RAT) Remote Code Execution Remote Code Execution (RCE) Remote Command Execution Remote Command Execution (RCE) Remote Exploitation Remote Work Exploitation Remote_Code_Execution Resource Constraints Responsible Disclosure REST API Exploitation Retail Cyberattacks Retail Sector Cyberattacks RetailCyberattack Retrieval-Augmented Generation (RAG) Reverse Proxy Risk Assessment Risk Management Risk-Based Vulnerability Management Risk-Based Vulnerability Management (RBVM) RMM Tool Abuse Robotic Process Automation (RPA) Romance Scams Router Security RSA Conference RSA Conference 2025 RSAC 2025 RSAC Conference 2025 Rubeus Russia-Ukraine Cyber Warfare Russian Hackers Rust Programming Language SaaS Security SaaS Security Risks Salt Typhoon Samsung MagicINFO Sandbox Detection Sandbox Escape SAP NetWeaver SAP NetWeaver Vulnerability Scattered Spider Scattered Spider/Octo Tempest ScatteredSpider SDK Integration Second Wave Attacks Secure by Design Secure Coding Secure Document Management System (DMS) Secure Software Development Security Clearance Security Operations Security Operations Center (SOC) Security Patch Security Tool Effectiveness Security Tool Sprawl Security Update SentinelOne Series A Funding Series B Funding Series_B_Funding Server-Side Includes (SSI) Injection Server-Side Request Forgery (SSRF) Serverless Service Disruption Session Hijacking Session_Hijacking Shadow AI Shell Scripting shellcode Signal Protocol Silent Patch SIM Swapping Skype Slack Security Breach Smart TV Privacy SMB Cybersecurity SME Cybersecurity Smishing SMS Phishing SNMP SNMP Vulnerability Social Engineering Social Media Account Takeover Social Media Malvertising Social Media Manipulation Social Media Scams Social Media Surveillance SocialEngineering Software Bill of Materials (SBOM) Software Bugs Software Development Lifecycle (SDLC) Security Software Installation Software Outage Software Procurement Software Security Software Supply Chain Software Supply Chain Attack Software Supply Chain Security Software Testing Software Update Software Vulnerabilities Software Vulnerability Software Vulnerability Patching Software_Update SonicWall SonicWall SMA Vulnerability SonicWall Vulnerability South Korea Tech Regulation Southeast Asia Sovereign Cloud Security Spam Campaign Spear Phishing Spear-phishing SPF Splunk Spyware SSH Vulnerability SSRF Vulnerability Stack-based Buffer Overflow Start Menu Issue State-Sponsored Attack State-Sponsored Attacks Static Analysis Steganography Streaming Device Privacy Subscription Scam Subscription Scams Sudo Supply Chain Attack Supply Chain Attacks Supply Chain Compromise Supply Chain Disruption Supply Chain Risk Management Supply Chain Security Supply_Chain_Disruption Supply-chain attack Surveillance Surveillance Malware Surveillance Technology Surveillanceware SVG File Exploitation Swatting Synology Vulnerability System Disruption System Prompt TAP Air Portugal Impersonation Targeted Advertising Targeted Attacks Tariffs and Trade Telecommunications Infrastructure Security Telegram Tenable Cloud Security Tesla Tesla Vulnerability Third-Party Risk Third-Party Risk Management Third-Party Risk Management (TPRM) Third-Party Software Vulnerability Third-Party Vulnerability Threat Actor Analysis Threat Actor Behavior Threat Actor Tactics Threat Actor Techniques Threat Actors/Cyberattacks Threat Attribution Threat Detection Threat Detection and Response Threat Hunting Threat Intelligence Threat Intelligence Sharing Threat Landscape Threat Modeling Threat_Detection Threat_Intelligence TikTok TLS Encryption Tor Tracking Trademark Scams Traffic Distribution Systems (TDS) Traffic Interception Transnational Crime Trojanized Software Typosquatting U2F (Universal 2nd Factor) Ubuntu UK UK National Cyber Security Centre (NCSC) UK Retail Sector UK Retailers Unauthenticated Access Unauthorized Access Unauthorized AI Tool Use Unauthorized System Access UNC3944 Unicode Tag Unified Exposure Management Unnecessary Privileges US Politics US Trade Policy US-China Cyber Competition US-China Cyber Relations USB Controller Vulnerability User Profiling Vendor Risk Management Visual Basic Script (VBS) VMware Security Voter Fraud VPN VPN Security VPN_Vulnerability Vulnerability Vulnerability Advisory Vulnerability Assessment Vulnerability Disclosure Vulnerability Exploitation Vulnerability Management Vulnerability Remediation Vulnerability Statistics Vulnerable Drivers WatchTowr Labs Weak Passwords Web Application Security Web Scanning Web Skimming WebAuthn Webmin Vulnerability Webshell Website Impersonation WhatsApp Whistleblower Windows Windows 10 Bug Windows 11 Windows 11 Updates Windows Security Windows Server Windows Update Issues Windows Vulnerability WordPress WordPress Malware WordPress Plugin Malware WordPress Plugin Vulnerability WordPress Vulnerability Workflow Automation Workplace Flexibility and Remote Work Wormable Attacks Wormable Exploit WSUS XML External Entity Injection (XXE) XMRIG XXE Vulnerability Yeman Youth Mental Health Zero Trust Zero Trust Model Zero Trust Security Zero-Click Exploit Zero-day Zero-Day Zero-Day Exploit Zero-Day Exploits Zero-Day Vulnerability Zero-Day Vulnerability (Probable) Zero-Day_Exploit Zero-Days ZeroTier
Categories All Account Takeover Prevention Advanced Persistent Threat (APT) Advanced Persistent Threat (APT) Activity Advanced Persistent Threat (APT) Analysis Advanced Persistent Threat (APT) Attacks AI and Cybersecurity Risks AI and Cybersecurity Threats AI and Machine Learning in Cybersecurity AI Development and Deployment AI Ethics and Misuse AI Ethics and Safety AI in Cybercrime AI in Cybersecurity AI in Cybersecurity Defense AI in Software Development AI Privacy and Security AI Risk Management AI Security AI Security Research AI Technology AI_in_Cybersecurity AI_Security AI-driven Cybersecurity Solutions AI-enabled Cybercrime Application Performance Monitoring Application Performance Tuning Application Security Application Security Best Practices Application Security Solutions APT Group Activity Artificial Intelligence Artificial Intelligence (AI) Artificial Intelligence (AI) in Security Artificial Intelligence in Business Artificial Intelligence in Computing Artificial Intelligence in Cybersecurity Authentication Authentication & Authorization Authentication and Access Management Authentication and Authorization Authentication Methods Authentication Security Authentication Technologies Automotive Cybersecurity Automotive Security Biometric Data Security Biometric Technology Botnet Analysis Browser-Native Security Solutions Business and Finance Business and Finance in Cybersecurity Business News CISA Guidance and Best Practices Cloud Security Cloud Security Research Cloud Security Solutions Cloud Service Security Combating Online Scams and Fraud Compliance Compliance and Governance Compliance and Regulation Consumer Privacy Consumer Technology Contract_Security_Breach Credential Management Critical Infrastructure Cybersecurity Critical Infrastructure Protection Critical Infrastructure Security Cross-border Data Transfer CrowdStrike Solutions for SMBs Cryptocurrency Security Cryptography CVE Program Analysis Cyber Espionage Cyber Insurance Cyber Threat Intelligence Cyberattacks against Businesses Cyberattacks and Threat Actors Cybercrime Cybercrime and Financial Fraud Cybercrime and Threat Actors Cybercrime Ecosystem Analysis Cybercrime Investigations Cybercrime Law Enforcement Cybercrime Trends Cybersecurity Cybersecurity Advisories and Threat Intelligence Cybersecurity and Society Cybersecurity at the RSA Conference Cybersecurity Awareness Cybersecurity Awareness and Education Cybersecurity Awareness and Prevention Cybersecurity Awareness Training Cybersecurity best practices Cybersecurity Best Practices Cybersecurity Career Development Cybersecurity Collaboration and Information Sharing Cybersecurity Countermeasures Cybersecurity Defense Strategies Cybersecurity Economic Impact Cybersecurity Funding Cybersecurity Incident Cybersecurity Incident Response Cybersecurity Incidents Cybersecurity Incidents in Retail Cybersecurity Industry News Cybersecurity Investments and Acquisitions Cybersecurity Law Cybersecurity Law and Litigation Cybersecurity Law and Politics Cybersecurity Leadership and Strategy Cybersecurity Litigation Cybersecurity M&A Cybersecurity Mitigation and Defense Cybersecurity Operations Cybersecurity Policy and Governance Cybersecurity Product News Cybersecurity Professionals Cybersecurity Readiness and Mitigation Cybersecurity Risk Assessment Cybersecurity Risk Management Cybersecurity Services Cybersecurity Solutions and Strategies Cybersecurity Strategies and Best Practices Cybersecurity Strategy & Best Practices Cybersecurity Strategy and Resilience Cybersecurity Technology Cybersecurity Threat Analysis Cybersecurity Threat Intelligence Cybersecurity Threat Landscape Cybersecurity Threat Landscape Analysis Cybersecurity Threats Cybersecurity Threats and Mitigation Cybersecurity Threats and Vulnerabilities Cybersecurity Tooling and Integration Cybersecurity Training and Exercises Cybersecurity Trends Cybersecurity_Funding Cybersecurity_News_and_Commentary Dark Web Activities Darknet Operations Data Breach Data Breach and Incident Response Data Breach Investigations Data Breach Response Data Hiding Data Loss Prevention (DLP) Data Privacy Data Privacy & Protection Data Privacy and Protection Data Privacy and Security Data Privacy Violation Data Protection and Recovery Data Security Data Security and Privacy Data Security Incident Response Data_Breach DDoS Attack Analysis DDoS Attacks DDoS Mitigation DevOps DevOps Security DevSecOps Tools Digital Forensics Disinformation and Influence Campaigns E-commerce Security EDR Security Education Sector Cybersecurity Election Infrastructure Security Email Security Email Security Best Practices Emerging Security Threats Emerging Technologies in Cybersecurity Emerging Threats Emerging Threats and Trends Endpoint Security Energy Sector Cybersecurity Enterprise Security Evasion Techniques Exploit Development Extradition Financial Crime Financial Cybercrime Financial Fraud Financial Impact of Cybercrime Fraud Prevention Funding and Investment Generative AI Generative AI Risk Management Geopolitical Cyber Conflict Geopolitical Cyber Espionage Geopolitical Cyber Threats Geopolitical Cyber Warfare Geopolitical Cyberattacks Geopolitical Cybersecurity Geopolitics and Cybersecurity Global Cyber Attack Reports Google Workspace Security Government Agency Funding and Restructuring Government and State-Sponsored Cyberattacks Government Cyber Security Incident Government Cybersecurity Government Cybersecurity Advisories Government Cybersecurity Policy Government Cybersecurity Policy and Funding Government Data Breach Government Data Security Government Investigations Government Policy Government Policy and Cybersecurity Government Policy and Regulation Government Regulation Government Regulations and Compliance Government Response Government Response to Cyberattacks Government Surveillance Government_Compliance Hacktivism Healthcare Cybersecurity Healthcare Data Security Higher Education Cybersecurity Mitigation Strategies Higher Education Cybersecurity Threats and Vulnerabilities History of Hacking Human Resources and Employee Management Identity and Access Management (IAM) Identity Management Incident Communication and Disclosure Incident Response Incident Response and Mitigation Incident Response and Recovery Incident Response and Threat Hunting Incident Response Best Practices Incident_Response IncidentResponse Industrial Control System (ICS) Security Industrial Control Systems (ICS) Security Industrial_Control_Systems_Security Insider Risk Management Insider Threat International Data Regulations International Relations Internet Privacy IoT Security Law Enforcement Law Enforcement and Cybersecurity Law Enforcement and Justice Law Enforcement Response Law Enforcement Response to Cybercrime Legal and Regulatory Legal and Regulatory Compliance Legal and Regulatory Issues Legal Proceedings LLM Security LLM_Security_Best_Practices Malware Analysis Malware Analysis and Threat Intelligence Malware Attacks Malware Technical Analysis Messaging App Security Mobile Application Security Mobile Device Security Mobile Security Mobile Security Best Practices Mobile Security Patching Mobile Security Threats Mobile_Security Modern Application Architectures Nation-State Cyber Attacks Nation-State Cyberattacks National Security Network Security Offensive Security Online Child Safety Online Fraud Online Scams Open Source Security Operating System Security Operational Technology (OT) Security Organized Crime Parental Control Technology Password Management Password Manager Usage and Benefits Password Security Password Security Best Practices Passwordless Authentication Penetration Testing Personal Cybersecurity Best Practices Philosophy of Hacking Phishing Attacks Phishing Awareness Phishing Campaigns Phishing Techniques Political Interference in Cybersecurity Post-Quantum Cryptography Solutions Privacy Privacy and Data Protection Privacy Violation Privacy vs. Law Enforcement Product Announcements Product Reviews Product Updates Quantum Cryptography Quantum Networking Quantum Threat to Cybersecurity Quantum-Resistant Security Ransomware Analysis Ransomware and Extortion Ransomware Attacks Ransomware Attacks and Mitigation Ransomware Mitigation Strategies Ransomware Response Ransomware Response and Prevention Ransomware Threat Analysis Ransomware Threat Landscape Ransomware_Threat_Landscape Ransomware-as-a-Service (RaaS) Regional Ransomware Trends Regulatory Actions in Tech Regulatory Compliance Regulatory Compliance and its Impact on SMEs Regulatory Response Retail Cybersecurity RetailSectorCybersecurity Risk Management Risk_Assessment_and_Mitigation Risks of Weak Passwords and AI-Generated Passwords SaaS Security Security Advisory Security Architecture and Engineering Security Awareness Training Security Best Practices Security Challenges Security Configuration Security Hardening Security Mitigation Strategies Security Operations Security Operations and Compliance Security Operations Automation Security Patching Security Policy Changes Security Recommendations Security Service Edge (SSE) Limitations Security_Tools_and_Technologies Small and Medium Business (SMB) Security Small Business Cybersecurity Threats Smart TV Security and Privacy SMB Security Gaps and Vulnerabilities SME Cybersecurity Best Practices and Mitigation Strategies SME Cybersecurity Risks and Vulnerabilities Social Engineering Software Bugs and Vulnerabilities Software Development Software Development Lifecycle Security Software Development Security Software Security Software Supply Chain Security Software Update Management Software Updates and Deprecation Software Updates and Features Software Vulnerabilities Software Vulnerabilities & Exploits Software Vulnerabilities and Exploitation Software Vulnerabilities and Exploits Software Vulnerability Software Vulnerability Advisory Software Vulnerability Analysis Software Vulnerability Disclosure Software Vulnerability Exploitation Software Vulnerability Management Software_Vulnerability_Analysis Spyware and Surveillance Spyware and Surveillance Technology Streaming Device Security Supply Chain Attacks Supply Chain Security Targeted Attacks Technical Deep Dive Technology News Technology Overview Telecommunications Security Third-Party Risk Management Third-Party Security Third-Party Vendor Risk Threat Actor Activities Threat Actor Analysis Threat Actor Profiling Threat Actor Tactics Threat Actor Tactics and Strategies Threat Actor Tactics and Techniques Threat Analysis Threat Detection Threat Detection and Response Threat Intelligence Threat Intelligence Applications Threat Landscape Analysis Threat Mitigation Threat Modeling Threat Prevention Threat Prevention and Mitigation Threat Research Threat Response Threat_Intelligence VMware Security Integration Vulnerability Advisory Vulnerability Analysis Vulnerability Analysis and Remediation Vulnerability Analysis and Response Vulnerability and Threat Management Vulnerability Disclosure Vulnerability Disclosure and Patching Vulnerability Exploitation Vulnerability Management Vulnerability Management Strategies Vulnerability Remediation Vulnerability Research Vulnerability Research and Disclosure Vulnerability Research and Mitigation Vulnerability_Management Vulnerability_Research_and_Disclosure Web Application Security Web Browser Security Web3 Security Website Security Whistleblower Retaliation Windows Operating System Security Windows Security WordPress Security Workplace Cybersecurity
Threat Actor All 24-year-old from Henan province in China 764 764 Inferno Abtach Ltd. Ahmed Elbadawy Akira ALPHV/BlackCat ALTSRUS Amadey operators Anonymous Hacker Anubis APT28 APT29 APT37 Artem Aleksandrovych Stryzhak Artem Stryzhak Attackers (in general deepfake context) Authenticated Attacker Axact Babuk Ransomware Actors Babuk2 Bjorka Balloonfly Baron Martin BestCombo Black Basta Black Kingdom Black Kingdom Ransomware Actors BlackJack BlackLock BlackLock affiliates BloddyMery Brute Ratel ByteDance Cactus Camaro Dragon China China-backed threat group China-based cybercrime group China-linked hackers Chinese authorities Chinese Communist Party Chinese Government Chinese Hackers Chinese Individual (linked to Magic Cat) Chinese Military Chinese People's Liberation Army Chinese state-sponsored hackers (PurpleHaze) Chinese threat actors CIGAR Cl0p COLDRIVER Competitors Conti Crime Groups with Links to the Russian Government Criminal gangs Criminal network operating through an I2P hidden service Criminal Teams Criminals involved in Europol's 2024 phishing network Customers of Commercial Surveillance Vendors Cyber espionage actors Cyberattackers cybercrime groups Darcula Developers of PhaaS kits (Tycoon 2FA, Evilproxy, Rockstar 2FA, Greatness, Mamba 2FA) Digitonics Labs DOGE DOGE Big Balls Ransomware Operator Donald Trump DragonForce DragonForce group Dylan Ash Earth Kasha Earth Kurma APT Earth Minotaur Embargo EncryptHub Evans Osiebo Evil Corp Ex-Disney Employee Fog Former high school athletic director in Maryland Four Arrested Individuals Four Individuals Four individuals arrested in Poland Four Individuals Arrested in Poland FunkSec Golden Chickens Groups linked to China GRU Unit 20728 Hacker Hacker(s) Handala Group Heaven's Gate Hive0117 hyper-polarized geopolitical actors Indian Cyber Force InfectedSlurs Inferno Drainer Inferno Drainer Developers Initial Access Broker Initial Access Broker (IAB) Initial Access Brokers Iranian threat group Joel Evans Karen National Army (KNA) Keiron Ellison Kremlin LabHost LabHost operators Lampion Malware Actors Lapsus$ LARVA-127 LARVA-290 Lemon Sandstorm Leonidas Varagiannis Leonidas Varagiannis (aka War) Liam White LockBit LockBit ransomware gang Lotus Panda Luna Moth Lynx Magento Supply Chain Attacker Medusa Meta Michael Scheuer Mirai Mirai botnet Mirai Botnet Mirai Botnet Operators MirrorFace Molatori Molatori group moom825 nation-state actor Nation-state attacker Nation-state threat actor Nation-states Nebulous Mantis NightSpire Nitrogen Nitrogen Ransomware Noah Michael Urban Noah Urban NoName057 NoName057(16) North Korea North Korea’s Reconnaissance General Bureau North Korean actors North Korean Developer in Shenyang North Korean government North Korean Government North Korean hackers North Korean IT workers North Korean IT Workers North Korean IT Workers and Ransomware Groups North Korean Military North Korean operatives Novice Threat Actor (Malware Development) NSO Group OpenAI Opportunistic Threat Actors Palantir Panda Shop PATCHWORK phishers Phishers Phobos Play Play ransomware gang PowerSchool Hacker Prasan Nepal Prasan Nepal (aka Trippy) Pravda PRODAFT Prolific Puma PurpleHaze Pygmalion Operators Qilin Rami Khaled Ahmed RansomEXX ransomware gang RansomHub Ransomware Crew Ransomware gang Ransomware Gangs Ransomware Group Ransomware groups Ransomware Groups Raytheon Reckless Rabbit REvil Revolver Rabbit Rhysida Rhysida ransomware affiliate Rhysida Ransomware gang Richard Anthony Reyna Densmore Robert Walker-McDaid RomCom Russia Russia's Main Intelligence Directorate (GRU) Unit 29155 Russian Intelligence Agencies (GRU/FSB) Russian Military Russian-speaking actors Ruthless Mantis Ruthless Rabbit Ryan Kramer Ryan Mitchell Kramer SafePay Salt Typhoon Satanic Saw Chit Thu Scattered Spider Shane Sonderman Six Individuals Charged in Netherlands and U.S. Slopsquatters smishers Smishers Smishing Triad Sophisticated Threat Actor (Credential Theft and Brute-forcing) Sophisticated Threat Actor (Influence-as-a-Service Provider) South Korea State-Affiliated Groups State-level actors state-sponsored hackers State-sponsored threat actors StealC developers STORM-1865 Storm-2460 Suspected nation-state threat actor TA455 TAG-124 The attacker (in Troy Hunt incident) TheWizards Threat actor (downstream extortion) Threat Actors Exploiting CVE-2025-31324 Threat Actors with links to Russian hacktivism Tina Peters Turkish Threat Actor Tyler Bariss Tyler Barriss Tyler Robert Buchanan Ukrainian Military Unauthenticated Attacker Unauthorized People UNC3944 UNC4841 Unidentified Miscreant Unknown Actor(s) Unknown Actors Unknown Nation-State Threat Actor Unnamed threat actor (December 2024 attack) Unnamed Threat Actors Unsophisticated Cyber Actor(s) Unsophisticated Threat Actors Unspecified Actors ValidMail VexTrio Viper Volt Typhoon Zero-Knowledge Threat Actors
Actor Aliases All _piers2 @Synacktiv 404 TDS addons.php Agent Serpens ANELLDR APT28 APT35 Bad actors badbullzvenom Balloonfly Baron Samedit BazarCall Billbug Black Kingdom BlueDelta Callisto cfxapi Cfxapi cfxsecurity Cfxsecurity chaos_princess Charming Kitten ChatGPT Chaya_002 CIGAR Criminals Crooks crypto-security-tool Cuba Cyclops Darcula DarkNights DarkNights/DarkNimbus DarkNimbus DarkWatchman DDoSIA DOGE DOLITTLE DragonForce DragonForce Malaysia Earth Kasha Evilginx Evilproxy Facebook FakeUpdates Fancy Bear Forest Blizzard Fusion Gangbang Greatness Grinex Grixba GRU H4lo Hacktivist groups Haise Harry HiddenFace hir0ot ImmigrationOS Industrial Spy Instagram Intersys Limited Jenny jetstress Karma Knight Kongtuke Kyle Lampionbanking malware LandUpdate808 LockBitSupp Lotus Blossom LukaLocker Magic Cat Mamba 2FA Milihpen Muddled Libra Nefilim Nefilim administrators Nemty neostress Nic Noname057(16) NoName57 NOOPDOOR Norks Nullbulge NullBulge Octo Tempest Orange Tsai Panda Shop Parisite Pawn Storm Pegasus Pioneer Kitten PipeMagic Play ransomware PlayCrypt Pompompurin PTI-288 Pydomer quickdown Raccoon Stealer RansomEXX RCSI Redline Rockstar 2FA Rubidium sAjibuu Salt Typhoon Saw Chit Chit Saw Htoo Eh Moo Scatter Swine Scattered Spider Sednit Silent Ransom Group SocGholish Sofacy Sofacy Group Spellbinder STAC4365 Star Blizzard Storm-0978 STORM-0978 STRONTIUM Synacktiv TA TA4557 TAG-124 Talented Ghostwriter Team Underground TeleMessage Signal Thomas Threat Actors TM SGNL tri.lm Trippy Tropical Scorpius Tycoon 2FA tylerb UAC-0180 UNC2596 UNC3944 UNC4057 UNC757 UPPERCUT Venom Spider Vidar Void Rabisu Volt Typhoon Vox Ghostwriting Vudo War watchTowr Wenjie Zhong (H4lo) WizardNet WP-antymalwary-bot.php x66/Kris yehia-mamdouh zapcut
Exploit Method All 2015 Steam shell scripting blunder 2023 Data Breach A2A Agent Card Exaggeration Abuse of Discord OAuth2 to Evade Detection Abuse of RMM Tool Free Trials Abuse of Single Sign-On and Access Tokens Accidental Exposure of .git and ENV files Accidental Exposure of Secrets in Public Repositories ACR Data Exploitation Active Directory ntds.dit Database Attack Admin_Credential_Leak_Exploit Advance-Fee Fraud and Extortion Adversary-in-the-Middle Phishing AI Text Detection Circumvention AI-assisted application process AI-Assisted Malware Development AI-Created Malware AI-Driven Data Mining of Stolen Data AI-enabled exploitation of known vulnerabilities AI-enhanced Phishing AI-Enhanced Phishing AI-enhanced Social Engineering AI-generated Audio Deepfakes AI-Generated Audio in School Scandal AI-Generated Deepfakes AI-Generated Deepfakes in Email AI-Generated False Positive Reports AI-Generated Password Weakness AI-Powered Credential Stuffing AI-powered Evasive Attacks AI-Powered Phishing AI-Powered Phishing Campaigns AI-Powered Polymorphic Phishing AI-Powered Recruitment Scam AI-powered Romance Scams AI-Powered Social Engineering AI-powered Social Engineering and Fraud AI-Powered Social Media Manipulation AI-powered Spam and Phishing AiCloud Authentication Bypass AirBorne AirBorne Vulnerabilities in AirPlay AirBorne_Communication_Interception AirBorne_One_Click_RCE AirBorne_Zero_Click_RCE AirPlay DoS and Spoofing AirPlay SDK Takeover AirPlay Vulnerabilities Exploit AirPlay Zero-Click Takeover AirTag Tracking Allowing Threat Actor to Decrypt Data and Clean Up AD ALPHV/BlackCat Ransomware AMSI Bypass and Cloud Infrastructure Android HTTP Toolkit VPN Exploitation Anonymity Abuse for Bullying and Suicide Apache Pinot Misconfiguration Exploit API Vulnerabilities Exploit Application and Service Misconfigurations Application-Layer Exploits APT28's multi-stage attack chain Arbitrary File Deletion and Privilege Escalation Arbitrary PHP Code Injection Exploit AresLoader Malware-as-a-Service ASUS AiCloud Auth Bypass ASUS AiCloud auth bypass exploit ASUS AiCloud authentication bypass ASUS AiCloud Authentication Bypass AT Command Injection leading to Heap-Based Buffer Overflow auth bypass exploit (ASUS AiCloud) Auth bypass exploit on ASUS routers with AiCloud Auth Bypass in ASUS AiCloud Authentication bypass impacting VMware Windows Tools Authentication Bypass in ASUS AiCloud Authentication Bypass in Gen 6 and Gen 7 Firewalls Automated Scanning and Exploit Kits Azure's Elevate Access Privilege Escalation Backdoor Access via `emergency_login` Parameter Basic and Elementary Intrusion Techniques bcdedit.exe for Safe Boot Disablement Biometric Access Exploitation Biometric Data Breach Blending Ransomware into Normal Network Traffic BlueKeep RDP Flaw Exploitation Bring Your Own Installer Bring Your Own Installer (BYOI) Bring Your Own Installer (BYOI) EDR Bypass Bring Your Own Installer (BYOI) technique Bring Your Own Vulnerable Driver (BYOVD) Broken Object Level Authorization (BOLA) Browser Password Extraction Brute Force Attacks Brute-force and phishing attacks Brute-force attacks Brute-Force Attacks Brute-Force/Credential Stuffing Attack Business Email Compromise (BEC) BYOI (Bring Your Own Installer) Technique BYOI Technique BYOVD (Bring Your Own Vulnerable Driver) Callback Phishing Callback Phishing with Impersonation of IT Help Desk Canary Exploit CBT File Parsing Argument Injection Chained Craft CMS zero-day attacks Chained Exploit (CVE-2023-44221 and CVE-2024-38475) Chained Exploitation of CVE-2024-38475 and CVE-2023-44221 Chaining Multiple Mobile Vulnerabilities Chinese APT Adversary-in-the-Middle Tool Chinese PLA Activity in Critical Infrastructure Chrome's 'App-Bound Encryption' cookie-theft bypass Cl0p ransomware group exploit of two zero-day flaws in Cleo's file transfer platform CLDAP Reflection/Amplification Cleo Secure File Transfer Software Zero-Day Exploit Cleo Vulnerability Exploit ClickFix ClickFix Social Engineering ClickFix Social Engineering Technique ClickFix Strategy (Interlock) CoGUI Phishing Kit Collab Object Command Injection COM Hijacking Commvault Command Center Path Traversal Exploit Compromised Credentials Exploit Compromised Third-Party Packages and Malicious Dependencies ConnectWise RAT Phishing Campaign (via compromised websites) Content Scraping Exploit Craft CMS Zero-Day Attacks Craft CMS Zero-Day Chain Craft CMS Zero-Day Exploit Credential and Cookie Theft (Chrome) Credential Dumping and Malicious Driver Attacks Credential Leak via Chat Logs Credential Manager Autofill Conflicts Credential Manager Migration Conflicts Credential Sharing and Unauthorized Access Exploit Credential Stuffing Credential Stuffing and Brute-forcing with Claude Credential Stuffing and RDP Exploitation Credential Stuffing via Compromised Password Manager Credential Stuffing/Compromised Credentials Credential Stuffing/Reuse of Weak Passwords Credential Theft Credential Theft and Lateral Movement Credential Theft and Login Credential-Based Attacks Critical Vulnerabilities Critical Vulnerability in AI Builder Langflow Exploit CRLF Injection in Webmin CGI Handling Cross-Site Scripting (XSS) Exploit CrowdStrike Faulty Software Update CrowdStrike Faulty Update CrowdStrike File Update Bricking Windows Machines Cryptocurrency Mining on Misconfigured Selenium Grid CSS Evasive Phishing CSS evasive phishing messages Curing Rootkit Custom Backdoors on End-of-Life Juniper Routers CVE-2025-29824 Exploit (Privilege Escalation) Cyber Espionage and Reconnaissance for Physical Attacks Darcula Phishing Platform DarkWatchman Malware Delivery via Phishing DarkWatchman Phishing Campaign DarkWatchman RAT Deployment via Phishing Data Breach Data Breach of TeleMessage/TM Signal Data Collection and Tracking by Streaming Devices Data Collection by Chrome and other Browsers Data Exfiltration Data Exfiltration via AirDrop and Clipboard (macOS) Data exfiltration via Better Stack Data Exfiltration via Forwarding Rules Data Exfiltration via LLM access to tools and APIs Data Exfiltration via Malicious NPM and PyPI Packages Data Exfiltration via Web Forms and AI Chat Interactions Data Exfiltration via WinSCP and Rclone Data Hijacking/Exfiltration Data Leak as Extortion Tactic Data Poisoning Data_Leak_and_Extortion_Tactics DCSync Attack DDoS Attack DDoS Attacks DDoS Attacks by NoName057(16) DDoS Attacks via Crowdsourced Platform DDoSIA DDoS Attacks via Stresser/Booter Services DDoS Extortion DDoS-for-hire Platforms DDoS-for-hire service exploitation DDoS-for-hire Services Exploitation Deceptive CAPTCHA and Node.js Backdoor Decrypt Later Decrypt-Later Deepfake Audio for Financial Fraud Deepfake Celebrity Endorsements Deepfake ID Verification Deepfake Impersonation Deepfake Video Call Scam Deepfake Video Conference Call Deepfake Voice Scam Targeting Italian Tycoons Default Kubernetes Helm Chart Misconfigurations Denial of Service (DoS) Attacks Dependency Confusion Dictionary Attack Diplomatic Academy of Ukraine Attack Discord Invite Link Hijacking Discord Phishing Campaign using Counterfeit Collab.Land Bots DiscordPyDebug RAT Disk Overwriting Exploit via Malicious Go Modules DLL Side-loading via Legitimate Executable (ANELLDR) DNS Hijacking for Software Update Hijacking DNS MX Record Exploitation DNS Spoofing DOGE Data Exfiltration Doxing DragonForce Ransomware DragonForce Ransomware Deployment Easily Exploitable Flaws Email Spoofing Email-based Harassment and Abuse Emergency_Login Exploit Encrypted Communication Encrypted Messaging Exploitation EPUB File Parsing Directory Traversal Remote Code Execution Erised ESET Flaw Exploited for Malware Execution ESP Reflection/Amplification Event Logging Disable Excessive Privileges and Misconfigurations Exploit in Cleo Hack (potentially linked to Ascension Data Breach) Exploit Kit Usage Exploit of Commvault Vulnerability Exploit of default passwords and lack of internet isolation on ICS/SCADA systems Exploit of FreeType Vulnerability (Zero-Day) Exploit of Microsoft Exchange Vulnerability Exploit of Misconfigurations Exploit of Misconfigured Apache Pinot Installations Exploit of OttoKit Vulnerability Exploit of Retail HVAC Units (Target Breach) and Fish Tank Thermostat (Casino Breach) Exploit of SAP NetWeaver Zero-Day Exploit of Second OttoKit Vulnerability Exploit of SentinelOne Products for Evasion Exploit of SonicWall Vulnerabilities Exploit of Weak Access Controls and High-Privilege Users Exploit of Windows Flaw Exploit of Windows Flaw (Zero-Day) Exploit using Python Decorators Exploit using Python Default Function Arguments Exploitation of a Windows Zero-Day Exploitation of Compromised Identities for Elevated Access Exploitation of Critical Bug in End-of-Life VMware Product Exploitation of Ivanti Connect Secure Vulnerabilities Exploitation of Lack of Cloud Logging Exploitation of Misconfigured Apache Pinot Installations Exploitation of Open Source Vulnerabilities in Healthcare Software Exploitation of OttoKit WordPress plugin flaw Exploitation of OttoKit WordPress Plugin Flaw Exploitation of Second OttoKit Vulnerability Exploitation of Telemarketing Devices Exploitation of Undetected Security Gaps Exploitation of Unpatched Web Server Vulnerability Exploitation of Unsecured Admin Credentials Exploitation of VPN Vulnerabilities (Black Basta) Exploitation of Vulnerabilities in Firewalls Exploitation of Vulnerabilities in Open-Source Components Exploitation of Vulnerabilities in Virtual Machines Exploiting Misconfigured Apache Pinot Installations Exploiting Unsecured Personal Devices Exploits Targeting SonicWall Extortion using Stolen Data F5 Labs Canary Exploit Failure to Change Credentials After Breach Fake Error Message Malware Installation Fake QR Code Exploit Fake Token Airdrops Faulty CrowdStrike Falcon Software Update Faulty Machine Learning Model in Exchange Online File Transfer Solutions FreeType Vulnerability Exploited as Zero-Day FreeType Zero-Day Exploit FreeType_Arbitrary_Code_Execution GCP IAM Condition Privilege Escalation GenAI Data Leakage Exploit GhostWeaver Payload Delivery and Persistence Gmail SMTP Server and WebSocket Data Exfiltration Google AdSense Code Injection Grixba Infostealer Deployment Hardcoded Credentials Exploit Harvest Now Harvest-Now HeadLace backdoor High CPU Utilization on Azure Front Door Infrastructure History-Sniffing via Visited Link Color Horizon3 Proof-of-Concept Exploit HTTP/2 Rapid Reset Impersonation Attacks Impersonation of Government Officials Improper Child User Account Management Improper Message Archiving Exploit Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet In-memory Execution of Beacon Object Files (BOFs) Inaccurate Facial Recognition Matching Inconsistent Passkey Implementations Indirect Prompt Injection Indirect Prompt Injection in ChatGPT's Memory Features Inferno Drainer's Multi-Layered Smart Contract Scheme Influence-as-a-Service using Claude Infostealing Malware Targeting Password Managers Insecure APIs Insecure Code in LLM Plugins Insecure Configuration File Access Insecure Password Sharing Insider Threat Recruitment Insider Threat via Employment of North Korean Operatives Insider Threats Insufficient Logging and Monitoring Insufficient Machine Identity Governance Internal Compromise of Pygmalion's Operational Security Intune Policy Bypass iOS Internet Sharing Traffic Interception IP Address and Email Validation IPFS for Payload Delivery IPv6 SLAAC Spoofing IPv6 SLAAC Spoofing and ICMPv6 Router Advertisement Manipulation Iris Modem Firewall Bypass Ivanti Zero-Day Exploit Purchase Java OpenGL Acceleration Disabled by Default JavaScript API Restriction Bypass JavaScript Injection Exploit JSP Webshell Deployment JSP Webshell Deployment and Payload Execution Jury Duty Scam LabHost PhaaS Platform Phishing Lack of Backups and Cyber Insurance Lack of End-to-End Encryption for Archived Communications Lack of End-to-End Encryption in TM Signal Archiving Lack of Machine Identity Discovery Lack of MFA on Admin Account Langflow AI Builder Exploit Langflow Deception Exploit Lateral Movement via Compromised Credentials and Unmonitored Device Leveraging regsvr32.exe and mshta.exe for Execution Living off the Land Living-off-the-Land Binaries and Scripts (LOLBins/LOLScripts) LLM Poisoning Local Agent Bypass Local Privilege Escalation via Incorrect Installer Permissions Low-Level Keyboard Hook for Keylogging LSB_Steganography Machine Credential Abuse Macro-enabled Excel document with malicious code (ROAMINGMOUSE) Magento Backdoor Magento E-commerce Attack with JavaScript Malware Malicious AI Art Generator Malicious AI Image Generation Tool Extension Malicious AI Models and Insecure Implementations Malicious Browser Extension Exploit Malicious Firmware Implant in TP-Link Routers Malicious Font File Exploit Malicious Go Module Supply Chain Attack Malicious JavaScript Injection Malicious SVG File Exploitation Malvertising Campaigns Malware Attack Leading to 1Password Vault Compromise Malware Delivery via Phishing on LinkedIn Malware Development with Claude Malware in AI Art Generation App Mamona Ransomware Custom Encryption Mamona Ransomware False Extortion Claims Mamona Ransomware Self-Deletion MCP Prompt Injection MCP Prompt Injection via Tool Descriptions and Responses MCP Rug Pull Attack MCP Server Prompt Injection MCP Tool Poisoning Meshery Arbitrary Code Execution Exploit Metadata Exposure in AI Image Generators MFA Bypass Techniques MFA Bypass via AiTM and Reverse Proxies MFA Bypass via Reverse Proxy MFA Bypass via Stolen Phone MFA Fatigue Attacks Microsoft Exchange and Pulse Secure VPN vulnerabilities exploitation MintsLoader Multi-Stage Infection Chain Mirai Botnet Attacks Mirai Botnet Deployment via JSP Upload Mirai Botnet Exploit of CVE-2024-7399 Mirai Botnet Exploitation Mirai Botnet Infection via Command Injection Mirai Botnet Infection via Path Traversal Misconfigured Apache Pinot Exploit Misconfigured Apache Pinot Installations Exploit Misconfigured Database Exposure Modular Malware using Dynamic DLL Loading MongoDB Credential Theft MOVEit Transfer exploit MSHTA Command Execution in CLEARFAKE Campaign MyBB zero-day exploit MyBB Zero-Day Exploit Mystery Box Scam with Hidden Subscriptions Mystery Box Subscription Scam Nation-State Actor Exploit of CVE-2025-3928 Nefilim Ransomware Attack Nefilim Ransomware Exploitation Network Intrusion (Generic) Next.js Middleware Auth Check Bypass NFC-enabled Fraud using Z-NFC and UFO NFC Non-compliant internal system North Korean Fake IT Worker Scheme North Korean Infiltration via Job Applications NotPetya Malware Obfuscated JavaScript Data Collection Obfuscated VBScript Execution OceanMap stealer OceanMap Stealer Variant oFono Sandbox Escape OHCI USB Controller Race Condition Exploit On-Premise Network Breach One-Time Code Vulnerability Opportunistic Exploits OTP Interception OttoKit Vulnerability Exploited to Hack WordPress Sites Out-of-bounds write exploit in FreeType Outdated Software Exploit (4chan) Pass-The-Hash Pass-The-Ticket Passkey Deletion Complexity Passkey Incompatibility Between Website and App Password Reuse Password-based cyber-attacks Pegasus Spyware Pegasus Spyware Exploit Pegasus Spyware Exploit via CVE-2019-3568 Pegasus Spyware Use Pegasus Zero-Click Exploit People Search Engine Data Exposure Persistence through wp-cron.php Modification Phishing Phishing and Credential Theft Phishing and Email Compromise Phishing and Spear-Phishing Phishing Attack Phishing Attack using TAP Air Portugal Impersonation Phishing Attack via Embedded Flask Web Server Phishing Attacks Phishing Attacks Against Password-Protected Accounts Phishing Campaigns Phishing using LabHost Platform Phishing with Credential Harvesting and 2FA Bypass Phishing with HeadLace Backdoor Phishing with Malicious ScreenConnect Installer Phishing_Campaign_Targeting_TAP_Air_Portugal_Customers Phishing-as-a-Service (PhaaS) PHP_Backdoor_in_Magento_Extensions PipeMagic Malware Deployment Plaintext Password Exploitation Play ransomware exploit Point-and-Click Hacking Tool Precomputed Contract Address Deployment Privilege Escalation via Lack of MFA Privilege Escalation via OttoKit Plugin Privilege Escalation via Software Provider Access Proactive Vulnerability Patching and Offensive Operations Prompt Injection Prompt Injection via Tool Metadata ProxyLogon ProxyLogon exploit ProxyLogon Exploit Qantas Phishing Campaign QCMAP_ConnectionManager Manipulation ql_atfwd Command Injection RAG-enabled LLM Data Leakage and Misinformation Ransomware Ransomware attack Ransomware Attack (Scattered Spider and/or DragonForce) Ransomware Attack by Fog Ransomware Attack on Co-op Ransomware Attacks Ransomware Attacks (Generic) Ransomware Attacks (Phobos) Ransomware Attacks on Critical Infrastructure Ransomware Attacks on Hospitals Ransomware Attacks on Identity Ransomware Exploits Ransomware Extortion Ransomware_Double_Extortion_with_Curve25519_Encryption Rapid Adversary Breakout RCE via Malicious Font Files Real ID Forgery Recruitment Fraud with Claude Registered Domain Generation Algorithm (RDGA) Regulatory Reporting as Extortion Tactic Remote Access During Non-Work Hours Remote Access Software Exploitation Remote Access Tools Remote Code Execution Remote Code Execution via Crafted HTTP Requests to /api/v1/validate/code Remote Code Execution via File Handling Remote Code Execution via Langflow's /api/v1/validate/code endpoint Remote Code Execution via REST API Resume Fraud and Misrepresentation Retaliatory Targeting of Cybersecurity Professionals Reverse NFCGate Technique RomCom RAT Deployment Russian Attempts to Undermine US Election Security Safari Screen Time Bypass Sagerunex Backdoor Salt Typhoon Attacks Salt Typhoon breaches Salt Typhoon Espionage Campaign Samsung MagicINFO Exploit Samsung MagicINFO Vulnerability Exploit Samsung MagicINFO Vulnerability Exploited Days After PoC Publication Scattered Spider Attacks Scattered Spider Ransomware Attack Scattered Spider Tactics (used by DragonForce) Scattered Spider tactics and DragonForce ransomware Scattered Spider Tactics with DragonForce Ransomware Scattered Spider's Cloud Authorization Sprawl Exploit Scattered Spider's Social Engineering and Legitimate Tool Abuse ScreenConnect RAT Phishing Campaign Second OttoKit Vulnerability Exploited to Hack WordPress Sites Second Ransomware Group Caught Exploiting Windows Flaw as Zero-Day Second Ransomware Group Exploiting Windows Zero-Day Second_Order_Command_Injection_Exploit Sensitive Data Exfiltration via AI Applications Server-Side Request Forgery (SSRF) Session Hijacking via CVE-2024-38475 Session Hijacking via Stolen Session Cookies Shadow SaaS and Identity Misuse Exploit Shadow Volume Copy Deletion Shared Password Exploit on SCADA System Shellcode Obfuscation with Shell3r Sheriff Backdoor Deployment via Compromised Website Sheriff Backdoor via ukr.net SIM Swapping SK Telecom SIM Swap Attack SLAAC Spoofing Slack Account Compromise Slopsquatting SMA SSLVPN Chain Exploit Smishing on a Massive Scale: ‘Panda Shop’ Chinese Carding Syndicate Smishing via Compromised Accounts Smishing_Toll_Road_Scam Smishing_with_Magic_Cat_Toolkit SMS-based Phishing with Okta Spoofing SNMP GET-NEXT callHomeUserDefCmdName Unexpected Sign Extension DoS SNMP GET-NEXT Stack-Based Buffer Overflow SNMP GET-NEXT with Malformed Data SNMP GET-NEXT with Malicious ciscoFlashFileSize Value SNMP Out-of-Bounds Read Denial-of-Service SNMP SET cewEventTime Stack-based Buffer Overflow SNMP_Buffer_Overflow_RCE SocGholish (FakeUpdates) Exploit Social Engineering Social Engineering (SIM-swapping and MFA bombing) Social Engineering (Spearphishing) Social Engineering and Sextortion Social Engineering Attack (used by DragonForce) Social Engineering Attack Leading to Password Reset Social Engineering Attacks Social Engineering for Credential Reset Social Engineering for Help Desk Impersonation Social Engineering for Initial Access Social Engineering through Impersonation and Advertising Social Engineering via Mislabeled Phone Number Social Engineering with Fake Model Profile Social Media Account Takeover Social_Engineering_via_AI_Personas SonicBoom SonicWall SMA Appliance Exploitation SonicWall SMA appliances exploitation SonicWall SMA100 Appliance Exploitation SonicWall SMA100 Exploits SonicWall SMA100 Flaws SonicWall Web Application Scanning Sophisticated Phishing with Spoofed Qantas Emails Spear Phishing and Whaling Attacks on Privileged Identities Spear-Phishing Spear-Phishing for Microsoft 365 Credentials Spear-phishing with Trojanized UyghurEditPP Spear-phishing with Weaponized Document Links Spearphishing with NF-e themed Malicious Attachments Spellbinder AitM Attack via IPv6 SLAAC Spoofing Spellbinder Exploit Spoofing and Impersonation Exploit SQL Injection SQL Injection (SQLi) and Cross-Site Scripting (XSS) SQL Injection Exploit SSDP Amplification SSH tunnel exploitation (ESXi ransomware) Start Menu Jump List Breakage Stolen Credentials & Web Shell Deployment Stolen Phone Exploitation for Network Access Subscription Scam through Fake Online Shops Subscription Scam with Hidden Recurring Payments Supply Chain Attack targeting Magento Sites Supply Chain Attack via Easyjson Supply Chain Compromise via Third-Party Components Supply-chain attack using malicious Go modules Swatting Sycophancy Exploit Symbolic Link Trick Symbolic Link trick bypassing FortiGate patches Symbolic Link Trick Bypassing FortiGate Patches Symbolic Link Trick to Bypass FortiGate Patches SYN Flood Targeting Weakly Secured Edge Devices Telegram Bot for Exfiltration Telegram Exfiltration TeleMessage Data Breach TeleMessage Signal Data Exfiltration Third-Party Access Exploitation Third-Party Breach Exploit Third-Party Risk Management Neglect TM Signal Archiving Feature Exploit Token Forgery and Authorization Header Manipulation TPMS_Certificate_Manipulation_RCE Tracking via Precise Location Data Traffic Distribution System (TDS) Trivial Compromise of TeleMessage Archive Server Trojanized UyghurEditPP Truesight.sys Driver Exploitation Typosquatting Typosquatting using 'crypto-encrypt-ts' Tzutil Command for Time Zone Information Gathering Unauthenticated API Access to User Profiles Unauthenticated Connection and Account Creation Unauthenticated JSP Web Shell Upload Unauthenticated Privilege Escalation via OttoKit API Unauthenticated RCE via crafted HTTP request Unauthenticated Remote Code Execution via API Endpoint Unauthenticated Remote Command Execution Exploit Unauthenticated Token Theft and Reuse Unauthenticated Web Shell Upload and Remote Code Execution Unauthorized Access and Data Breach of Mesa County Voting Systems Unauthorized Access and Server Compromise Unauthorized Access and Use of Work Laptop and Account Unauthorized Access to Co-op Systems Unauthorized Access to Emera and Nova Scotia Power Networks Unauthorized Access to Harrods Systems Unauthorized Access to Private LLMs via Exposed API Key Unauthorized Data Transfer to China Unauthorized GenAI Tool Access Unauthorized Generative AI Tool Usage Unauthorized Physical Access to Server Rooms Unauthorized Upload of Sensitive Data to Unsanctioned Services Unmanaged Devices in Hybrid Work Models Unprotected Chat Log Storage Exploit Unprotected Kubernetes Services via Default Helm Charts Unrestricted File Upload via SAP NetWeaver Metadata Uploader Unrestricted RDP Access Unsecured Document Storage and Sharing Unspecified Data Breach Upload_Bypass Use of .LNK Files and Batch Scripts for Malware Delivery Use of Legitimate but Outdated Binaries Use of regsvr32.exe and mshta.exe for execution Use of TeleMessage (Signal clone) for sensitive government communications Use of Uploaded Images for Model Training Use of Valid Accounts Use of VPNs to Mask Location Venom Spider Spear-Phishing Campaign ViewState Code Injection Volt Typhoon and Salt Typhoon APT Campaigns Volt Typhoon Intrusion VPN Exploitation (Co-op) VPN IP Address Range Persistence VPNs Vudo Weak Identity and Access Controls Weak or Stolen Passwords Exploit Web Form Data Collection Web Skimming via Fake Fonts Domain Webshell Planting Website Misconfiguration Leading to Data Leak WhatsApp Video Call Exploit WhatsApp Zero-Day Exploit Windows 11 Upgrade Bypass via Intune Policy Circumvention Windows Active Directory Compromise via NTDS.dit theft Windows Update Service (wuauserv) Failure WordPress Plugin Malware World-Writable Directory Creation Worldcoin Sybil Attack (Potential) Wormable Zero-Click RCE Exploit WSUS Update Failure (0x80240069) XMRig Cryptocurrency Miner Installation via Fake CRM Application XXE and Command Injection Chain Zero-click FreeType Code Execution Zero-click Remote Code Execution via AirPlay Zero-day exploit targeting Commvault Zero-day Exploits ZIP_archive_JSP_injection
Vulnerabilities All CVE-2015-2291 CVE-2018-10561 CVE-2018-6137 CVE-2019-11510 CVE-2019-3568 CVE-2021-20016 CVE-2021-20035 CVE-2021-26855 CVE-2021-26857 CVE-2021-26858 CVE-2021-27065 CVE-2021-3156 CVE-2021-44228 CVE-2023-23397 CVE-2023-35082 CVE-2023-38950 CVE-2023-38951 CVE-2023-38952 CVE-2023-44221 CVE-2023-46805 CVE-2023-49103 CVE-2024-10445 CVE-2024-11120 CVE-2024-13943 CVE-2024-21113 CVE-2024-21338 CVE-2024-21412 CVE-2024-21887 CVE-2024-21893 CVE-2024-21894 CVE-2024-23120 CVE-2024-2825 CVE-2024-28995 CVE-2024-29745 CVE-2024-29748 CVE-2024-32896 CVE-2024-34098 CVE-2024-34099 CVE-2024-37085 CVE-2024-38178 CVE-2024-38475 CVE-2024-44308 CVE-2024-44309 CVE-2024-4577 CVE-2024-49039 CVE-2024-53104 CVE-2024-55956 CVE-2024-58136 CVE-2024-6029 CVE-2024-6030 CVE-2024-6031 CVE-2024-6032 CVE-2024-6047 CVE-2024-7399 CVE-2024-9680 CVE-2025-1976 CVE-2025-20147 CVE-2025-20154 CVE-2025-20162 CVE-2025-20164 CVE-2025-20169 CVE-2025-20170 CVE-2025-20171 CVE-2025-20172 CVE-2025-20173 CVE-2025-20174 CVE-2025-20175 CVE-2025-20176 CVE-2025-20182 CVE-2025-20186 CVE-2025-20188 CVE-2025-20221 CVE-2025-2082 CVE-2025-22230 CVE-2025-22457 CVE-2025-23120 CVE-2025-23242 CVE-2025-23243 CVE-2025-24091 CVE-2025-24129 CVE-2025-24132 CVE-2025-24137 CVE-2025-24206 CVE-2025-24252 CVE-2025-24271 CVE-2025-2439 CVE-2025-2445 CVE-2025-2446 CVE-2025-2447 CVE-2025-24522 CVE-2025-26647 CVE-2025-27007 CVE-2025-27363 CVE-2025-2759 CVE-2025-2774 CVE-2025-2775 CVE-2025-2776 CVE-2025-2777 CVE-2025-2778 CVE-2025-2825 CVE-2025-29824 CVE-2025-29953 CVE-2025-30065 CVE-2025-30406 CVE-2025-3102 CVE-2025-31191 CVE-2025-31324 CVE-2025-32011 CVE-2025-32433 CVE-2025-3248 CVE-2025-32819 CVE-2025-32820 CVE-2025-32821 CVE-2025-34028 CVE-2025-35975 CVE-2025-35996 CVE-2025-36521 CVE-2025-36558 CVE-2025-3887 CVE-2025-3925 CVE-2025-3928 CVE-2025-4041 CVE-2025-4043 CVE-2025-4096 CVE-2025-42599 CWE-89
MITRE ATT&CK TTP All "A new iteration of the malware includes notable changes to the manner code injections are handled "Adversaries have also been observed injecting Google AdSense code into at least 17 WordPress sites in various places with the goal of delivering unwanted ads and generating revenue on either a per-click or per-impression basis."] "Content Injection: T1659 "context": "The malware disguises itself as a security plugin to evade detection. This obfuscation makes it harder to identify and remove." "context": "The malware injects malicious JavaScript code and Google AdSense code into websites to serve ads and generate revenue for the attackers." "context": "The malware injects malicious PHP code into the site's header file "context": "The malware uses a C&C server for communication and downloads JavaScript code from another compromised domain. This indicates the use of remote services to control the malware and deliver additional payloads." "context": "The malware uses PHP and JavaScript code to communicate with a C&C server "contradictions": "None" } "independent_analysis": "Injecting code into the header file alters the normal execution path of the website "independent_analysis": "The article describes the use of PHP and JavaScript for malicious activities "independent_analysis": "The deliberate insertion of malicious and/or unauthorized code into legitimate webpages to modify their content and functionality is a clear case of content injection. This modifies the website's behavior without the owner's knowledge or consent." "independent_analysis": "The malware relies on external communication with a C&C server and downloads additional components from another compromised domain "independent_analysis": "The use of a name like \"WP-antymalwary-bot.php\" is an attempt to disguise the malicious nature of the plugin "Obfuscated Files or Information: T1027 "Process Injection: T1055 "Proxy: T1090 "Remote Services: T1021 "The plugin is also complemented by a malicious wp-cron.php file \" comes with a variety of features to maintain access AI-Created Malware: T1027 and execute remote code."] and inject malicious JavaScript. The wp-cron.php file shows use of PHP scripting for persistence." Application Layer Protocol: T1071 as is code that helps spread malware into other directories and inject malicious JavaScript responsible for serving ads\"" Bring Your Own Vulnerable Driver attacks continue Broken Access Control: T1068 Cloud Accounts: T1078 Cloud Accounts: T1078.004 Command and Scripting Interpreter: T1059 Content Injection: T1659 Credential from Password Stores: T1555 Credential Stuffing: T1552 Credentials from Password Stores: T1555 Data Breach: T1562 Data Encrypted for Impact: T1486 Data Exfiltration: T1021 Data Exfiltration: T1070 Data Exposure: T1486 Data Leakage: T1486 demonstrating clear use of remote services for functionality and persistence." Denial of Service: T1562 Deobfuscate/Decode Files or Information: T1140 Distributed Denial of Service: T1490 Drive-by Compromise: T1189 effectively injecting the malicious code into the running process of the webserver. This technique bypasses security mechanisms that may be in place for file uploads or other methods of code insertion." Email Forwarding Rule: T1114.003 Exploit Public-Facing Application: T1190 Exploitation for Client Execution: T1203 Exploitation for Privilege Escalation: T1068 Exploitation of Remote Services: T1210 External Remote Services: T1133 fetching JavaScript code hosted on another compromised domain to serve ads or spam." fetching JavaScript code hosted on another compromised domain to serve ads or spam."] File and Directory Discovery: T1083 hide itself from the admin dashboard Impair Defenses: T1562 indicating the use of command and scripting interpreters to achieve the attacker's goals. The wp-cron.php file is a clear example of using PHP for persistence and automation. " Indicator Removal: T1070 Ingress Tool Transfer: T1105 Inhibit System Recovery: T1490 Input Capture: T1056 it provides threat actors administrator access to the dashboard and makes use of the REST API to facilitate remote code execution by injecting malicious PHP code into the site theme's header file or clearing the caches of popular caching plugins."] Lateral Tool Transfer: T1570 Malware Data Mining: T1003 Modify Registry: T1112 Native API: T1106 Non-Application Layer Protocol: T1095 Obfuscate Files or Information: T1027 Obfuscate/Decode Files or Information: T1027 Obfuscate/Decode Files or Information: T1140 Obfuscated Files or Information: T1027 Obfuscation Files or Information: T1027 OS Command Injection: T1059 OS Command Injection: T1068 OS Credential Dumping: T1003 Path Traversal: T1083 Phishing: T1566 PowerShell: T1059.001 Process Injection: T1055 Prompt Injection: T1566 Proxy: T1090 quotes": ["\"Pinging functionality that can report back to a command-and-control (C&C) server is also included quotes": ["\"Pinging functionality that can report back to a command-and-control (C&C) server is also included\"" quotes": ["A new iteration of the malware includes notable changes to the manner code injections are handled quotes": ["Once installed and activated quotes": ["The plugin Ransomware-as-a-Service (RaaS) dominance Ransomware: T1486 Remote Services: T1021 Scheduled Task/Job: T1053 Service Stop: T1489 Spearphishing Attachment: T1193 Spearphishing Link: T1192 spread to other directories Supply Chain Compromise: T1195 System Information Discovery: T1082 thus obfuscating its true purpose and functionality from security analysts and administrators." Trusted Relationship: T1199 ttp": { "items": { "Command and Scripting Interpreter: T1059 Unsecured Credentials: T1552 Valid Accounts: T1078 which goes by the name \"WP-antymalwary-bot.php which is a form of process injection into the website's execution flow." which recreates and reactivates the malware automatically upon the next site visit should it be removed from the plugins directory."] Windows Management Instrumentation: T1047 XML External Entity Injection
Exploited Software All @logtail/node 1Password 23andMe's internal systems Active Directory Active! Mail Active! Mail 6 Adobe Acrobat Reader DC AES Agent2Agent (A2A) Protocol AhnLab security solutions AI art generation tool (unnamed) AI Builder Langflow AI systems (in general) AI-Generated Passwords (from ChatGPT, Llama, DeepSeek) AI-powered video and audio generation technologies AirPlay AirPlay audio SDK AirPlay Protocol AirPlay SDKs (Audio & Video) AirPlay video SDK Akira Alexa+ ALPHV/BlackCat Ransomware Amazon Fire TV Amazon Web Services (AWS) Android Android Apps (TikTok, Spotify, WhatsApp) Android RCS Android System Android_malware_credit_card_theft Android_malware_in_mapping_app ANEL (aka UPPERCUT) Anthropic Claude Desktop AnyDesk Apache Apache ActiveMQ NMS Apache HTTP Server Apache HTTP Server 2.4 Apache HTTP Server 2.4.59 and earlier Apache Log4j2 Apache OFBiz Apache Parquet Apache Parquet Java Library Apache Pinot Apache Pinot Helm chart Apache Tomcat APIs Apple Apple AirPlay Apple AirPlay protocol and SDK Apple AirPlay Protocol and SDK Apple AirPlay SDK Apple AirTag Apple CoreServices (macOS) Apple iMessage Apple iTunes Apple products Apple Products Apple Safari Apple TV AresLoader Atera Atlassian Jira Authenticator apps (if lacking PIN/password protection) AutoGen AVG Application Frame Host AWS Azure Azure's Elevate Access bankingbundleserv Bash bcdedit.exe Binance Smart Chain (BSC) BioTime BrightSign OS Broadcom Broadcom Brocade Fabric OS Broadcom Fabric OS Broadcom software Brocade FabricOS Browser Extensions Browser Password Storage buttonfactoryserv-paypal Call of Duty CarPlay Communication Plug-in Catalyst SD-WAN Manager CBP's existing facial recognition tool cfc-bsb Cfxapi cfxsecurity Cfxsecurity ChatGPT ChatGPT (and other GenAI tools) ChatGPT (OpenAI's image generator) ChatGPT 4o ChatGPT AI Actions ChatGPT Enterprise ChatGPT o3 Chrome Chrome Web browser Chromecast (on Android TV) Cisco ASA Cisco ASA firewall Cisco IOS Cisco IOS XE Cisco IOS XE SD-WAN Cisco IOS XR Cisco products Cisco Products Cisco Smart Licensing Utility Citrix NetScaler Claude Claude Desktop Claude-3.5-Sonnet CLDAP Cleo Cleo's file transfer platform ClickFunnels Cloud Infrastructure cmd.exe Co-op internal systems Co-op IT systems Code interpreter tool coffin-codes-2022 Coffin-Codes-2022 coffin-codes-net Coffin-Codes-NET coffin-codes-net2 Coffin-Codes-NET2 coffin-codes-pro Coffin-Codes-Pro coffin-grave Coffin-Grave coffin2022 Coffin2022 CoGUI phishing platform Collab.Land Collab.Land bots ComfyUI_LLMVISION (malicious AI image generation tool extension) Commvault CommVault Commvault Command Center Commvault software Commvault Web Server Commvault webserver compliancereadserv-paypal Consumer Rewards Program Systems Contactless Payment Systems Craft CMS CrewAI CrowdStrike CrowdStrike EDR CrowdStrike Falcon CrushFTP CrushFTP CVE-2025-2825 crypto-encrypt-ts curl Cursor Cursor Composer Custom Malware Darcula phishing kit DarkWatchman Delta (Ukraine's battlefield management system) DigitalOcean Discord Discord RAT discordpydebug Disney's internal menu creation system DOGE DoorDash DragonForce Ransomware Dropbox easyjson Electronic Benefit Transfer (EBT) System Elliptic-curve cryptography Email Clients (Unspecified) Encrypted messaging services Endpoint Protection Software Enterprise-specific security and networking products Erlang/OTP SSH ESP ESXi Ethereum Evilginx Evilproxy explorer.exe Facebook Fake CRM Application Figma connector File Transfer Solutions Firefox Firewalls Fish tank thermostat (casino breach) Flask Flutter Mobile Apps FortiGate Fortinet FortiOS Fortinet VPN FreeBSD FreeType FreeType 2 GCP IAM Conditions and tagBindings Gemini GeoVision IoT devices Get TransactionByID tool Git GitHub GitHub Copilot Agent Mode github.com/blankloggia/go-mcp github.com/steelpoor/tlsproxy github.com/truthfulpharm/prototransform GitLab Gladinet Gladinet CentreStack Gladinet CVE-2025-30406 Gmail Go Modules Google Ads Google Chrome Google Chromecast/Google TV Google Cloud Platform Google Drive Google Forms Google Meet Google Workspace GoReShell Government Websites (Ukraine) GoVision GPT-4o Grixba infostealer GStreamer Hancitor HanifNet, HXLibrary, and NeoExpressRAT Harrods systems HauteLook header.php Health and Biotech Software Helm Charts (Generic) herewalletbot Hospital Systems HTTP/2 HubSpot Hugging Face HVAC units (Target breach) ICS/SCADA systems ICS/SCADA systems in Oil and Gas Organizations Identity Providers ie4uinit.exe Image and Text Generation AI Industrial Control Systems (ICS) Operational Technology (OT) systems iOS iOS 16.5.1 IP validation tools (ipinfo[.]io, ipgeolocation[.]io, ipapi[.]co) iPhone iQVW64.sys Ivanti Ivanti Connect Secure Ivanti Connect Secure and Policy Secure Ivanti products Ivanti Software (Unspecified) Ivanti VPN Jan AI JavaScript jetstress Juniper Routers KUNBUS PiCtory KUNBUS Revolution Pi OS Bookworm Langflow LastPass LinkedIn Linode Linux Linux kernel Linux Kernel Linux-based video camera Llama-3-8 B Llama-based applications (image- and text-generation) LLM Models (Claude Sonnet 3.7, Google Gemini 2.5 Pro Experimental, OpenAI's GPT-4o) LLMs (Large Language Models) LOSTKEYS (Malware) Lynx M&S internal systems M&S Online Ordering System Magento Magento Ecommerce Packages (Tigren, Magesolution, Meetanshi) Magic Cat Mailchimp Major U.S. Pharmacy Chain System Mamona Ransomware Marks & Spencer systems Masimo's On-Premise Network MATE Desktop Atril Document Viewer MCP Servers (Google/Wiz) Medical Devices (CT Scanners, MRIs, Pacemakers) Meetanshi CookieNotice Meetanshi CurrencySwitcher Meetanshi DeferJS Meetanshi FacebookChat Meetanshi Flatshipping Meetanshi ImageClean Mesa County voting systems Meshery Meshery Helm chart MetaMask Metasploit Framework (extapi extension) MGS Blog MGS Brand MGS DeliveryTime MGS GDPR MGS Lookbook MGS Popup MGS Portfolio MGS ProductTabs MGS StoreLocator MicroDicom DICOM Viewer Microsoft 365 Microsoft Accounts Microsoft Active Directory Microsoft APT Microsoft Copilot Microsoft Edge Microsoft Entra ID Microsoft Entra ID (formerly Azure Active Directory) Microsoft Excel Microsoft Exchange Microsoft Exchange Online Microsoft Exchange Server Microsoft OneDrive Microsoft Teams Microsoft Windows Microsoft Windows CLFS Driver Microsoft Windows SmartScreen Military Systems (Ukraine) Mimecast Mirai botnet Mobile Operating Systems Modbus TCP Model Context Protocol (MCP) Monday.com MongoDB More_eggs MOVEit MFT MOVEit Transfer Mozilla Firefox MSHTA mshta.exe msxsl.exe MyBB MyFitnessPal N-able Remote Access Nefilim ransomware Nefilim Ransomware neostress neostress, jetstress, zapcut, cfxapi NFCGate NightSpire Node.js NOOPDOOR (aka HiddenFace) Nvidia drivers oauth2-paypal oFono Okta One-time codes (SMS) OneDrive for Business Online Portals of Dutch Public Organizations OpenSSH OpenSSL 1.1.1 Optigo Networks ONS NC600 Oracle Cloud Oracle VirtualBox OttoKit OttoKit WordPress plugin OttoKit WordPress Plugin OttoKit: All-in-One Automation Platform (formerly SureTriggers) Out-of-date security firm binaries Outdated Software Outdated software package (Unspecified) Outlook Outlook.com OWASP Juice Shop Palantir's case management system (integrated into ImmigrationOS) Palo Alto Networks products Palo Alto Networks VPN Password-based authentication systems Password-protected accounts paymentapiplatformservice-paypal PayPal mobile application for Android PDQ Connect Pegasus spyware phpMyAdmin PipeMagic backdoor malware Planet Technology Industrial Networking Products Play PNG images Power Grid Systems PowerSchool databases PowerSchool PowerSource customer support portal PowerSchool Student Information Management System PowerSchool Student Information System PowerShell PowerSource support portal Productivity apps (email, calendar) ProjectSend Proofpoint Proton Mail Pulse Secure VPN PyTorch Qilin Qualitia Active! Mail Qualitia Active! mail 6 QuickBooks, Shopify, Hubspot quickdown QuickDown Raccoon Stealer RansomHub Ransomware Raw Dating App API Raytheon's internal development system Rclone RDP RDP Services react-native-scrollpageviewtest Real ID (physical cards) Redline regisr32.exe Remote Desktop Protocol (RDP) Rhysida Ring doorbell cams Roku RomCom RAT Roundcube Routers (with default 'admin' password) RSA RSA Mobile Lock rundll32.exe SaaS Applications (Unspecified) Safari SafePay Sagerunex backdoor Salesforce Samba Services Manager (Sony Bravia TVs) Samsung MagicINFO Samsung MagicInfo 9 Server Samsung MagicINFO 9 Server Samsung MagicINFO v9 Server SAP NetWeaver SAP NetWeaver Visual Composer SAP's enterprise resource planning systems SCADA system Scattered Spider Screen Connect ScreenConnect ScreenConnect (ConnectWise Control) Selenium Grid Selenium Grid Helm chart (unofficial) SentinelOne SentinelOne EDR SentinelOne EDR Agent SentinelOne Endpoint Detection and Response (EDR) SentinelOne Endpoint Security Products SentinelOne Windows agent SFTP SHA-1 SharePoint Online Sheriff Sheriff (Windows Backdoor) Signal (mobile messaging application) Signal (modified version) SIP Slack Smart TV Firmware (Various Brands) SMB SMS SMS Gateways SMS-based two-factor verification system Software with CVE-2023-23397 Sogou Pinyin Solaris SonicWall SonicWall Gen 6 and Gen 7 firewalls SonicWall Secure Mobile Access (SMA) 100 Management Interface SonicWall Secure Mobile Access (SMA) 100 series appliances (SMA 200, 210, 400, 410, 500v) SonicWall Secure Mobile Access (SMA) appliances Sonicwall SMA SonicWall SMA SonicWall SMA 100 SonicWall SMA 100 Series SonicWall SMA 100 Series (SMA 200, 210, 400, 410 and 500v) SonicWall SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v SonicWall SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v devices SonicWall SMA appliances SonicWall SMA100 SonicWall SMA100 Appliance SonicWall VPN Splashtop SQLite SQLite (version 3.46.0) StealC Steam (2015) sudo SuperOps Syncro Synology BeeStation BST150-4T SysAid SysAid IT support software SysAid ITSM software SysAid On-Premise Telegram TeleMessage TeleMessage Signal TeleMessage Signal (TM Signal) TeleMessage Signal clone TeleMessage TM SGNL Tencent QQ Tesla Model 3 VCSEC module Tesla Model S Iris Modem Firmware Tesla Model S Iris Modem QCMAP_ConnectionManager Tesla Model S Iris Modem ql_atfwd process Tigren Ajaxcart Tigren Ajaxcompare Tigren Ajaxlogin Tigren Ajaxsuite Tigren Ajaxwishlist Tigren MultiCOD TikTok TikTok Platform TM SGNL TM Signal tommyboytesting Tor Tor Browser TP-Link Routers truesight.sys Twilio Tycoon 2FA Ubuntu UG65-868M-EA UKR.net UKR.NET ukr.net (website) UKR.NET and Yahoo Ukrainian government websites Ukrainian Ministry of Justice state registries Unpatched web server (with unspecified vulnerability) Unsecured File Storage/Sharing Solutions Unspecified Administrator Account Unspecified Co-op Systems Unspecified Database Software Unspecified Deutsche Bank Server Software Unspecified Disney Employee Systems/Accounts Unspecified Email Clients Unspecified FAA Software Unspecified Harrods Systems Unspecified Infostealers Unspecified M&S Systems Unspecified Mobile Operating Systems Unspecified On-Premises Systems Unspecified Remote Access Software Unspecified Routers, VPNs, Firewalls Unspecified Software (CVE-2025-0411) Unspecified Software (CVE-2025-24071) Unspecified Software Depending on Hallucinated Packages Unspecified Software in US Critical Infrastructure Unspecified Software with Unpatched Vulnerabilities Unspecified Software within Federal Government and Critical Infrastructure Systems Unspecified Telecommunications Network Equipment Unspecified Third-Party Components and Open-Source Software Unspecified Video Conferencing Software Unspecified Web Servers and Network Infrastructure userbridge-paypal userrelationship-paypal UyghurEditPP Various browsers, crypto wallets, password managers, remote desktop applications, email clients, and instant messaging applications Various ERC-20 Token Contracts Various Online Stores/Websites Various unspecified browser software Vidar Video Conferencing Software View Transactions tool Virtual Desktop Systems Visual Basic Script (VBS) VMware ESXi VMware Product VMware Tanzu Platform VMware vCenter VMware vCenter Server VPN VPN Software (Unspecified) VPNs Web Applications (Unspecified) Web Applications (with SQL Injection vulnerabilities) Web Applications with weak file upload filters Web Browsers (Unspecified) Web Reader tool web3x WebKit Webmin Weltpixel GoogleTagManager WhatsApp Windows Windows 11 Windows 11 22H2 Windows 11 23H2 Windows Active Directory Services Windows AMSI (Antimalware Scan Interface) Windows CLFS Windows Common Log File System (CLFS) Windows Common Log File System (CLFS) Driver Windows Desktop Logon Windows Event Logs Windows Kerberos Windows PCs Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server Update Services (WSUS) Windows User Account Control (UAC) Windsurf WinSCP WonderCMS WooCommerce (implied) Word processing software WordPad WordPress WordPress (via OttoKit) World App wp-cron.php WPS Office xAI API Yahoo Yahoo Mail Yii Framework YouTube zapcut ZimbraMail Zoho Assist Zyxel Zyxel CPE Series
Involved Countries All Afghanistan Albania Apple Argentina Australia Azerbaijan Bahrain Belarus Belgium Brazil Britain California Cambodia Canada Chile China Colorado Croatia Cuba Cyprus Czech Republic Denmark Dubai Ecuador Estonia EU Europe European Countries European Union Finland Florida France Germany Greece Hong Kong Illinois India Indonesia Iran Ireland Israel Italy Japan Kazakhstan Kenya Kyrgyzstan Latvia Liberia Lithuania Madagascar Malaysia Maryland Mexico Michigan Microsoft Moldova Mongolia Morocco Myanmar Netherlands New York New Zealand Nigeria North Carolina North Korea North Korea (DPRK) Norway Ohio Pakistan Palau Peru Philippines Poland Portugal Romania Russia Saudi Arabia Singapore Somalia South Korea Spain Sweden Switzerland Syria Taiwan Tesla Thailand Turkey UAE UK Ukraine United Arab Emirates United Arab Emirates (UAE) United Kingdom United States United States of America Uruguay US USA Venezuela Vietnam Wisconsin Yemen
Affected Industries All Accounting Advertising Advertising Industry Aerospace Aerospace and Defense Agriculture Agro-industrial AI Agent Development AI Development AI Security Air Transportation Airline Industry Airlines Antivirus/Cybersecurity Application Performance Monitoring (APM) Application Security Artificial Intelligence Artificial Intelligence (AI) Artificial Intelligence (AI) / Machine Learning Artificial Intelligence (AI) / Machine Learning (ML) Artificial Intelligence (AI) Development Automotive Automotive Industry Automotive Rental Automotive Retail Aviation Aviation & Aerospace Banking Beverage Biotechnology Business Business Process Outsourcing (BPO) Business Services Businesses Call Centers Car Rental Carriers Casino Casino and Hotel Casino/Gaming Chemical Civilian Sector Cloud Computing Cloud Security Cloud Service Providers Cloud Services Cloud Storage Collaboration Software Commercial Spyware Industry Communication Software/Technology Communications Communications, Media, and Technology Construction Construction and Engineering Construction Sector Consumer Discretionary Consumer Electronics Consumer Goods and Services Consumer Rewards Programs Consumer Staples Corporate Critical Infrastructure Critical National Infrastructure (CNI) Cryptocurrency Cryptocurrency Exchange Cryptocurrency Exchanges Cryptocurrency Mining Customer Service Customer Support Customs and Border Protection Cyber Disaster Restoration and Recovery Cyber Insurance Cyber Security Cybersecurity Cybersecurity Services Data Backup and Recovery Data Engineering and Analytics Data Management Data Protection/Backup and Recovery Data Protection/Cyber Resilience Dating App Industry Defense Defense Contracting Defense Organizations (NATO-related) Delivery Services Design Digital Forensics and Incident Response (DFIR) Digital Signage Digital Signage/CMS Digital Signage/Content Management Systems Digital Signage/Digital Media E-commerce E-commerce (Online Marketplaces) Ecommerce Education Education (K-12) Education/Academic Cheating Election Infrastructure Election Technology Elections Electric Electric Grid Electric Utilities Electric Utility Electronics Email Marketing Email Security Email Service Providers Email Services Emergency Services Employee Benefits Administration Encrypted Messaging Services Endpoint Detection and Response (EDR) Endpoint Security Energy Energy (specifically, Nova Scotia Power) Energy and Materials Energy Sector Engineering Engineering Consulting Enterprise Software Entertainment Entertainment (Media) Entertainment (specifically, The Walt Disney Company) Eyewear Federal Government Federal Government (US) Film Finance Finance (specifically Cryptocurrency) Finance and Insurance Finance/Cryptocurrency Financial Financial Institutions Financial Sector Financial Services Financial Services (Payments) Financial Services/Banking Font Rendering Libraries Food Service Food Services Fraud Prevention Gambling Gambling and Casinos Gambling/Casinos Gaming Generative AI Generative AI (GenAI) Genetic Testing/Biotechnology Government Government (Federal) Government (Netherlands) Government (specifically National Security) Government (specifically Transportation Security Administration - TSA) Government (specifically, election administration) Government (US Federal) Government (US) Government Agencies Government/Legal Government/Politics Government/Tax Agencies Hardware Hardware Logistics Health Technology Healthcare Healthcare (Hospitals) Healthcare (specifically Electronic Benefit Transfer) Higher Education Home Automation/Smart Home Hospitality Hospitality (Restaurants) Hospitality/Tourism Hosting Services Human Resources (HR) Human Resources (HR) Software Human Rights Identity Management Identity Management and Security Illicit Drug Trade Industrial Industrial Control Systems (ICS) Industrial Control Systems (ICS) / Operational Technology (OT) Industrial Manufacturing Industrial Sector Industrials Information Technology Information Technology and Services Information Technology/Cybersecurity Insurance Internet of Things (IoT) Internet-connected security camera industry IT IT and Enterprise IT Management IT Security IT Service Management (ITSM) IT Services IT Services/Web Development IT Support/Managed Service Providers IT Support/Managed Services IT Support/Remote Access IT/Technology Support Journalism Large Enterprises Law Law Enforcement Law Firms Legal Sector Legal Services Libraries Libraries/Archives Logistics Logo/Web Design Managed Security Service Providers (MSSPs) Managed Service Providers (MSPs) Manufacturing Marketing Marketing and Advertising Marketing and Data Analytics Media Media & Entertainment Media and Entertainment Media Companies Medical Billing Services Medical Device Manufacturing Medical Practices Messaging and Archiving Messaging Application industry Military Military/Defense Mobile Application Development Mobile Browser Industry Mobile Device Manufacturing Mobile Operating System Development Mobile Operating Systems Modeling Agency Network Attached Storage (NAS) Devices Network Security Network Security/Firewall Network Security/VPN Networking Equipment Networking/Telecommunications NGO NGOs (Non-Governmental Organizations) Non-Governmental Organizations (NGOs) Oil and Gas Oil and Gas Transportation Oil and Natural Gas Online Advertising Online Banking Online Dating Online Forums/Bulletin Boards Online Gaming Open Source Software Development Operational Technology (OT) Organizations using SonicWall Secure Mobile Access (SMA) Payment Processing Pet Care Pharmaceutical Pharmaceuticals/Opioids Pornography Ports Power and Utilities Private Business Private Sector Productivity SaaS Public Institutions Public Sector Publishing Publishing/Ghostwriting Ransomware Real Estate Recruitment/Human Resources Recycling Research Retail Retail and Wholesale Risk Management SaaS Security and Network Products Security and Networking Security Operations Security Operations Centers (SOC) Semiconductor Semiconductor Manufacturing Service Providers Small and Medium Businesses (SMBs) Small and Medium-Sized Businesses (SMBs) Small and Medium-sized Enterprises (SMEs) Small Businesses (US) Social Media Social Media/Messaging Software Software (SAP) Software and Cloud Computing Software and IT Services Software and Technology Software as a Service (SaaS) Software Browser Industry Software Companies Software Development Software Development/AI Software Development/AI Development Software Development/App Development Software Development/Cybersecurity Software Development/Mobile OS Software Engineering Software Industry Software Security Software Supply Chain Security Software/AI Development Software/Cybersecurity Software/Data Backup and Recovery Software/Data Management Software/Education Technology Software/Gaming Industry Software/IT Software/Spyware Development Software/Spyware industry Software/Spyware Industry Software/Technology Software/Technology (Specifically, Malware Developers) Spyware/Surveillance Technology State and Local Government State and Local Governments (US) Streaming Streaming Media Streaming Services Streaming/Internet Celebrities Surveillance Technology Tech Industry Technology Technology (Apple) Technology (General) Technology (specifically, Hitachi Vantara) Technology Vendors Technology/Instant Messaging Technology/IT Telecom Telecommunications Telecommunications/Communications Archiving Telecommunications/Networking Television Manufacturing Think Tanks Third-Party Risk Management (TPRM) Ticket Reselling Ticketing Tourism Trademark Registration Services Transport Transportation Transportation (Airports) Transportation (Toll Roads) Travel and Tourism Utilities VPN Security VPN Services VPN/Network Security Water Water Treatment Web Application Development Web Browser Development Web Hosting Web Hosting/Website Development Web Security Web3 Website Development/Hosting Website Development/WordPress Plugin Industry Website Hosting Industry WordPress Plugin Development WordPress Plugin Development Industry