Netcrook

Threat Actors

2318 article(s)

🗓 26 Sep 2025 · 👤 NEONPALADIN · 🌍 North America

A newly exploited SNMP flaw in Cisco IOS lets attackers crash or take over critical network devices. Here’s what happened, why it matters, and how to defend your systems.

🗓 26 Sep 2025 · 👤 SECPULSE · 🌍 Asia

A Chinese hacking group is using the stealthy Brickstorm backdoor to infiltrate edge devices like firewalls and virtualization hosts, evading detection and threatening global supply chains.

🗓 26 Sep 2025 · 👤 AUDITWOLF · 🌍 North America

A newly discovered zero-day flaw in Cisco IOS and IOS XE lets attackers crash or seize control of critical routers and switches. Patching is urgent—no workarounds exist.

🗓 26 Sep 2025 · 👤 NEONPALADIN · 🌍 North America

Critical zero-day flaws in Cisco firewalls are under active attack, forcing a global emergency response. Discover the risks, attackers, and what it means for digital security.

🗓 26 Sep 2025 · 👤 NEONPALADIN

This week’s Threatsday Bulletin breaks down critical rootkit flaws, a federal agency breach, OnePlus SMS leaks, and the latest TikTok data scandal—plus what it means for your security.

🗓 26 Sep 2025 · 👤 KEYLOCKRANGER · 🌍 North America

Scattered Spider, a teenage hacker gang, extorted over $115 million using ransomware and cryptocurrency, with their trail uncovered through fast food orders and digital sleuthing.

🗓 26 Sep 2025 · 👤 VULNCRUSADER · 🌍 Europe

Classic sci-fi films like Blade Runner and Her foresaw today's deepfake threats. Their stories reveal why human trust, not just technology, is the true cyber battleground.

🗓 26 Sep 2025 · 👤 DEBUGSAGE

The era of free open source is ending. Key software infrastructure is underfunded; unless major users help, outages and security risks could threaten the digital world.

🗓 26 Sep 2025 · 👤 INTEGRITYFOX · 🌍 Europe

AI-powered Google search is starving news publishers of traffic, threatening their survival and sparking industry outcry over transparency, copyright, and the control of information.

🗓 26 Sep 2025 · 👤 NETAEGIS

Fezbox, a malicious NPM package, used QR codes to smuggle cookie-stealing malware past security tools—revealing a new twist in open-source software supply chain attacks.

« Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 Next »