Latest news

The Cloudflare cascade: operational failure
Databreach

The Cloudflare cascade: operational failure

19 November 2025 dark6

The recent, prolonged disruption experienced by Cloudflare, affecting global internet traffic for several hours, wasn’t a conventional cyberattack. Instead, it’s...
DoorDash data breach: a social engineering compromise
Databreach

DoorDash data breach: a social engineering compromise

18 November 2025 dark6

The recent disclosure by DoorDash regarding a cybersecurity incident, initially attributed to a social engineering attack, warrants a detailed examination...
WhatsApp’s silent threat: the screen-sharing scams
Scams

WhatsApp’s silent threat: the screen-sharing scams

18 November 2025 dark6

The current wave of WhatsApp scams, fueled by the platform’s recently introduced screen-sharing feature, is a prime example. It’s a...
Google’s “Agentic SOC” takes a concrete step:  alert triage and investigation agent
AI

Google’s “Agentic SOC” takes a concrete step: alert triage and investigation agent

18 November 2025 dark6

The hype around AI-driven security operations has become almost deafening, but often lacks the granular detail necessary for serious assessment....
Chrome: a rapid-response Zero-Day exploits type confusion vulnerabilities
Vulnerability

Chrome: a rapid-response Zero-Day exploits type confusion vulnerabilities

18 November 2025 dark6

Google’s Chrome browser has found itself squarely in the crosshairs. A critical, previously unknown vulnerability – a zero-day – is...
The Payroll Pirates: a malvertising and layered attack infrastructure
Malware

The Payroll Pirates: a malvertising and layered attack infrastructure

18 November 2025 dark6

The “Payroll Pirates,” as Check Point researchers have dubbed them, represent a particularly insidious threat – a coordinated campaign targeting...
SpearSpecter: Iran’s Patient, multi-layered targeting campaign
Spyware

SpearSpecter: Iran’s Patient, multi-layered targeting campaign

17 November 2025 dark6

The cybersecurity landscape is increasingly characterized by sophistication, and the ongoing SpearSpecter campaign represents a particularly concerning evolution in state-sponsored...
Microsoft Entra guest invitations: a sophisticated TOAD evolution
Scams

Microsoft Entra guest invitations: a sophisticated TOAD evolution

17 November 2025 dark6

The landscape of sophisticated social engineering attacks is constantly shifting, and a recent development involving Microsoft Entra guest user invitations...
The AppCloud anomaly: pre-installed surveillance on Samsung Galaxy devices
Spyware

The AppCloud anomaly: pre-installed surveillance on Samsung Galaxy devices

17 November 2025 dark6

The recent accusations surrounding Samsung’s deployment of the AppCloud analytics application within its Galaxy A and M series smartphones, primarily...
SilentButDeadly: a targeted disruption of EDR networks
Blog

SilentButDeadly: a targeted disruption of EDR networks

16 November 2025 dark6

The relentless evolution of cyber threats has forced security professionals to continually adapt, often relying on increasingly complex Endpoint Detection...
FortiWeb CVE-2025-64446 PoC: a critical weapon now widely available
Vulnerability

FortiWeb CVE-2025-64446 PoC: a critical weapon now widely available

16 November 2025 dark6

The cybersecurity landscape has shifted once again, driven by the public release of a proof-of-concept exploit targeting the critical vulnerability...
SmartApeSG: the persistent evolution of a ClickFix-based RAT campaign
Malware

SmartApeSG: the persistent evolution of a ClickFix-based RAT campaign

14 November 2025 dark6

The SmartApeSG campaign, previously identified by aliases like ZPHP and HANEY MANEY, continues to demonstrate a remarkable capacity for adaptation,...