The cybersecurity landscape continues to evolve as threat actors behind the WARMCOOKIE backdoor malware have significantly enhanced their capabilities, introducing new features and maintaining active […]
Author: cyberbytes
Hackers Turn AWS X-Ray into Command-and-Control Platform
Red team researchers have unveiled XRayC2, a sophisticated command-and-control framework that weaponizes Amazon Web Services’ X-Ray distributed application tracing service to establish covert communication channels. […]
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous […]
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals. The company said […]
Extortion gang opens data leak site to squeeze victims of its Salesforce attacks
The Scattered Lapsus$ Hunters gang, which says it has stolen data from the Salesforce instances of dozens of international companies in recent months, upped its […]
Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage
Dutch Prime Minister Dick Schoof described the incident as part of a broader pattern of Russian hybrid attacks against Europe. ​The original article found on […]
Scattered Lapsus$ Hunters Returns With Salesforce Leak Site
After claiming it would shut down, the cybercriminal collective reemerged and threatened to publish the stolen data of Salesforce customers by Oct. 10 if its […]
Newly-discovered threat group hijacking IIS servers for SEO fraud, warns Cisco Talos
A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization (SEO) fraud, as well as […]
Top 10 Best End-to-End Threat Intelligence Companies in 2025
In 2025, businesses face growing challenges in securing their digital assets, networks, and sensitive data. The rise in sophisticated cyberattacks has made end-to-end threat intelligence […]
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from […]