Latest news

Voldemort: new wave of Google Sheets exploits
Malware

Voldemort: new wave of Google Sheets exploits

2 September 2024 dark6

In a concerning development within the cybersecurity landscape, researchers from Proofpoint have identified a sophisticated campaign leveraging Google Sheets as...
The emergence of ManticoraLoader: a new threat in the cybersecurity landscape
Malware

The emergence of ManticoraLoader: a new threat in the cybersecurity landscape

2 September 2024 dark6

In recent weeks, the cybersecurity community has been alerted to the rise of a new Malware-as-a-Service (MaaS) offering known as...
A critical vulnerability in Mirai botnet: remote DoS exploit discovered
Vulnerability

A critical vulnerability in Mirai botnet: remote DoS exploit discovered

26 August 2024 dark6

Recent investigations into the Mirai botnet have unveiled a significant remote denial-of-service (DoS) exploit, identified as CVE-2024-45163. This vulnerability was...
E-commerce vulnerabilities exposed: the Magento skimmer incident
Vulnerability

E-commerce vulnerabilities exposed: the Magento skimmer incident

26 August 2024 dark6

A recent cyberattack targeting Magento, a widely used e-commerce platform, has raised significant concerns within the cybersecurity community. Hackers have...
Emergence of PG_MEM malware targeting PostgreSQL databases
Vulnerability

Emergence of PG_MEM malware targeting PostgreSQL databases

24 August 2024 dark6

Aqua Nautilus researchers have uncovered a dangerous new malware strain named PG_MEM, specifically designed to exploit the PostgreSQL database management...
Overview of the August 12, 2024 Google Cloud Platform outage in London
Cybercrime

Overview of the August 12, 2024 Google Cloud Platform outage in London

13 August 2024 dark6

On August 12, 2024, Google experienced a power outage at its London data center, leading to a notable disruption of...
Disruption of the Radar/Dispossessor ransomware operation: a major victory against cybercrime
Ransomware

Disruption of the Radar/Dispossessor ransomware operation: a major victory against cybercrime

13 August 2024 dark6

In a significant breakthrough for global cybersecurity, the FBI, in collaboration with law enforcement agencies from the UK and Germany,...
AMOS stealer campaign targeting Mac users via fake Loom website
Malware

AMOS stealer campaign targeting Mac users via fake Loom website

12 August 2024 dark6

Recent research from Moonlock Lab has unveiled a sophisticated cybercriminal operation, potentially connected to a group dubbed “Crazy Evil,” that...
Vulnerabilities in Google’s Quick Share could lead to remote code execution
Vulnerability

Vulnerabilities in Google’s Quick Share could lead to remote code execution

12 August 2024 dark6

Recent findings have spotlighted significant security vulnerabilities in Google’s Quick Share, a file-sharing tool that works across Android, Windows, and...
Fenice exposes 1.4 billion Tencent records
Databreach

Fenice exposes 1.4 billion Tencent records

12 August 2024 dark6

A recent data breach attributed to the threat actor known as “Fenice” has resulted in the exposure of approximately 1.4...
Critical zero-day vulnerability in Microsoft Office: CVE-2024-38200
Vulnerability

Critical zero-day vulnerability in Microsoft Office: CVE-2024-38200

11 August 2024 dark6

On August 8th, Microsoft revealed a significant zero-day vulnerability, tracked as CVE-2024-38200, affecting multiple versions of its Office suite with...
Escalating iranian cyber influence operations ahead of the 2024 US elections
Spyware

Escalating iranian cyber influence operations ahead of the 2024 US elections

11 August 2024 dark6

As the 2024 US presidential election looms, the Microsoft Threat Analysis Center (MTAC) has unveiled an alarming uptick in cyber-enabled...