Topic: attack techniques

  • $900K XSS Bounty, HybridPetya Attack, & Burger King Censorship

    $900K XSS Bounty, HybridPetya Attack, & Burger King Censorship

    Restaurant Brands International issued a DMCA takedown against researchers who exposed data vulnerabilities, despite the issues being patched after private reporting. Google distributed $1.6 million in rewards at a cloud-focused bug bounty event, contributing to a total of $2.5 million in cloud-r...

    Read More »
  • WorldLeaks Ransomware Unleashes New 'RustyRocket' Malware

    WorldLeaks Ransomware Unleashes New 'RustyRocket' Malware

    A new malware called **'RustyRocket'**, used by the extortion group World Leaks, is designed for stealthy data theft and persistent network access, evading traditional security. The malware, written in Rust, acts as a data exfiltration and proxy tool, targeting Windows and Linux by hiding its tra...

    Read More »
  • Ransomware Never Dies, It Multiplies

    Ransomware Never Dies, It Multiplies

    Ransomware attacks reached a record high in 2025, with over 6,100 total extortion incidents, as criminal groups rapidly adapted despite law enforcement takedowns of major operations. The threat landscape saw a significant reshuffle among prominent ransomware gangs, with groups like Akira and Qili...

    Read More »
  • APT36 Hackers Use Linux .desktop Files to Deploy Malware in Latest Campaign

    APT36 Hackers Use Linux .desktop Files to Deploy Malware in Latest Campaign

    A cyber espionage campaign by Pakistani-linked group APT36 is targeting Indian government and defense sectors using malicious Linux .desktop files disguised as PDFs in phishing emails. The attack involves weaponized .desktop files that execute hidden commands to download and run a Go-based malwar...

    Read More »
  • New ChatGPT Attack Steals Secrets from Gmail Inboxes

    New ChatGPT Attack Steals Secrets from Gmail Inboxes

    A new prompt injection attack successfully extracted sensitive Gmail data by manipulating AI assistants, exploiting how AI interprets instructions and remaining difficult to prevent. The vulnerability was addressed reactively after discovery, using a method that bypassed existing protections by d...

    Read More »