Skip to content
SparTech Software

SparTech Software

Your Protection, Our Mission since 1987

  • Services
    • Service Offerings
    • Security Services Request
  • News
    • Cybersecurity News
    • CyberPulse Updates
  • Knowledge
    • AI/Machine Learning
    • Cybersecurity Defense
    • Encryption
    • Reconnaissance
    • Scanning and Analysis
    • Exploitation
  • Resources
    • 3rd Party News Feeds
    • Analysis
    • Cheat Sheets and Checklists
    • Glossary
    • Honeypot Stats CURRENT
    • Labs and Lessons
    • PawnPad Pentest Studio
    • Ransomware Live Feed
    • References
  • Facebook
  • Bluesky
  • Instagram
  • Pinterest
  • Threads
  • LinkedIn
  • Twitter
Requests
Top Stories
Drupal Core SQL bug exploited, urgent patching urged
May 23, 2026
SANS SEC670 sharpens Windows implant dev skills
May 23, 2026
First VPN cybercrime service dismantled in EU raid
May 22, 2026
CISA Faces Hill Scrutiny After Keys Leak on GitHub
May 22, 2026
Kimwolf DDoS botnet admin arrested in Canada sting
May 22, 2026
New multi-stage info-stealer hits Chromium browsers
May 22, 2026
Alleged Kimwolf IoT Botnet Boss Arrested in Canada
May 22, 2026
GitHub breach tied to poisoned Nx VS Code extension
May 21, 2026
GitHub probes TeamPCP claim of 4k internal repo breach
May 20, 2026
OAuth consent phishing PhaaS hits 340 Microsoft orgs
May 20, 2026
macOS SHub Reaper stealer spoofs Google, Apple logins
May 20, 2026
Windows zero-day claims surge after latest Patch Tuesday
May 20, 2026
INTERPOL Ramz Sweep Nets 201 in MENA Cybercrime Crackdown
May 19, 2026
Malicious npm packages mimic Shai-Hulud worm code
May 19, 2026
Windows BitLocker zero-day bypass exposes encrypted drives
May 19, 2026
FamousSparrow APT targets Azerbaijani energy sector
May 14, 2026
Doh! Gentlemen RaaS breach: 16GB internal data leaked
May 14, 2026
Fresh variant of the self-propagating Shai-Hulud npm worm detected
May 12, 2026
The AI-powered Village pentesting tool is raising cybersecurity eyebrows.
September 15, 2025
DripDropper Malware: When Hackers Become Security Patchers
August 20, 2025
Microsoft Scrambles to Fix Windows Update Bug Causing SSD Failures
August 20, 2025
Microsoft Experiences Major Service Outage Affecting Copilot and Office.com
August 20, 2025
Threat actor offers 15.8 million PayPal user credentials on cybercrime forum.
August 18, 2025
Noodlophile infostealer is being distributed through fake copyright and intellectual property infringement notices.
August 18, 2025
Security researcher discloses full authentication bypass exploit for Fortinet’s FortiWeb application firewall.
August 17, 2025
Microsoft has announced two critical security enhancements currently in development for Teams users worldwide.
August 17, 2025
National Public Data has quietly returned onlineΒ after shutting down following one of the largest Social Security number breaches in U.S. history.
August 15, 2025
Fortinet has issued aΒ critical security alertΒ for a severe vulnerability in its FortiSIEM platform.
August 13, 2025
Microsoft August 2025 Security Update Addresses Critical Kerberos Vulnerability Among 111 Total Flaws.
August 13, 2025
A critical vulnerability in HTTP/2 implementations has emerged as a significant threat to web infrastructure worldwide.
August 13, 2025
Major Cyber Incident Paralyzes Pennsylvania Attorney General’s Office.
August 12, 2025
Critical Security Alert: Over 3,000 NetScaler Devices Remain Vulnerable to CitrixBleed 2 Exploit.
August 12, 2025
Curly COMrades: New Cyber-Espionage Group Deploys Advanced Malware Against Government Targets.
August 12, 2025
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications.
August 12, 2025
Hackers release 9GB of data stolen from North Korean state-backed hacker’s computer.
August 12, 2025
International Law Enforcement Dismantles BlackSuit Ransomware Infrastructure.
August 12, 2025
Three notorious cybercrime groups have joined forces in a new collaborative effort to wreak havoc across the planet.
August 12, 2025
Cybersecurity researchers have successfully cracked the encryption used by DarkBit ransomware.
August 12, 2025
Discovery of Google Chrome sandbox escape vulnerability nets researcher $250,000 reward.
August 12, 2025
Charon Ransomware: APT-Level Sophistication Meets Enterprise Targeting
August 12, 2025
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543
August 12, 2025
DARPA announces winners of AI Cyber Challenge for innovation in automated cybersecurity defense.
August 11, 2025
Critical zero-day vulnerability in WinRAR is currently being exploited by cybercriminals in targeted attacks.
August 11, 2025
Researchers discover attack method that exploits Gemini AI through Google Calendar invites.
August 11, 2025
North Korean ScarCruft Group Shifts Strategy: Adding Ransomware to Espionage Operations.
August 11, 2025
Vulnerabilities in automotive dealer platforms could allow remote car hacking and extensive data theft.
August 11, 2025
Addressing HTML Injection Vulnerability in WordPress Advanced Custom Fields Plugin
August 8, 2025
Scammers Launch Mass-Mailing Campaigns with Efimer Trojan to Steal Cryptocurrency
August 8, 2025
Columbia University Data Breach: Far-Reaching Impacts for 869,000 Individuals
August 8, 2025
Satellite Cybersecurity Under the Microscope: Lessons from Black Hat Las Vegas
August 8, 2025
Supply Chain Attacks Target RubyGems and PyPI, Prompting Major Security Overhauls
August 8, 2025
CISA issues emergency directive to patch critical Microsoft Exchange vulnerability CVE-2025-53786 by Monday.
August 7, 2025
Samourai Wallet founders plead guilty to laundering > $200 million for criminal enterprises.
August 7, 2025
SonicWall says spike in recent VPN attacks is tied to now-patched vulnerability, not a zero-day.
August 7, 2025
Hacker who stole more than $3.3 million from U.S. taxpayers extradited to the US.
August 7, 2025
WhatsApp discovers (and removes) 6.8 million accounts linked to global scam operations.
August 6, 2025
New Command-and-Control (C2) method, Ghost Calls, uses Zoom and Teams TURN servers to tunnel malicious traffic undetected.
August 6, 2025
Searchlight Cyber enhances Cerberus dark web investigation platform with AI to automate investigation of threats on the dark web.
August 6, 2025
Google confirms that they have suffered a data breach involving the recent Salesforce cloud attacks.
August 6, 2025
Trend Micro confirms active exploitation of 2 critical vulnerabilities in Apex One Management Console.
August 6, 2025
DaVita Notifies Over One Million Patients of Major Data Breach Following Ransomware Attack.
August 6, 2025
CISA adds D-Link cameras and NVR vulnerabilities to Known Exploited Vulnerabilities (KVE) Catalog
August 6, 2025
MIND unveils an autonomous Data Loss Prevention (DLP) platform engineered to protect Generative AI (GenAI).
August 6, 2025
Microsoft introduces Project Ire: AI prototype for analysis and classification of malware.
August 6, 2025
Global Infostealer Campaign Hits 4,000 Victims in 62 Countries, Fuels Cybercrime Economy.
August 5, 2025
FraudOnTok SparkKitty malware campaign targets TikTok shop owners and their cryptocurrency wallets.
August 5, 2025
Adobe issues emergency patches after public release of proof-of-concept code.
August 5, 2025
New ReVault vulnerability leaves millions of Dell laptops susceptible to persistent attacks.
August 5, 2025
Cisco discloses data breach affecting cisco.com accounts. Basic profile details were leaked through a vishing attack.
August 5, 2025
Microsoft’s Zero Day Quest hacking contest booty increased to $5 million.
August 5, 2025
Unable to pinpoint zero-day vuln, SonicWall says customers should immediately disable SSLVPN services amid escalating ransomware attacks.
August 5, 2025
Discord’s CDN exploited to deliver a Remote Access Trojan (RAT) disguised as a legitimate OneDrive file.
August 5, 2025
A newly disclosed set of critical vulnerabilities in NVIDIA’s Triton Inference Server has put organizations operating AI workloads at significant risk.
August 4, 2025
D4rk4rmy claims responsibility for cyberattack against Monte-Carlo SociΓ©tΓ© des Bains de Mer (SBM), operator of luxury hotels, casinos, and entertainment venues.
August 4, 2025
Chanel targeted in a wave of Salesforce data theft attacks.
August 4, 2025
DHS, CISA, and FEMA announce over $100 million in funding for cybersecurity infrastructure improvements.
August 4, 2025
Bitdefender urges immediate firmware update for Dahua cameras after discovering critical vulnerabilities.
August 4, 2025
LegalPwn exploits AI models by using legitimate legal language to trick them into misclassifying malicious software as safe code.
August 4, 2025
After two years of development, Hashcat 7.0.0 password cracking tool is released.
August 4, 2025
Non-human identities (NHIs) are now outpacing human accounts across organizations.
August 4, 2025
China’s Great Firewall upgrade falls flat, inadvertently undermining the very infrastructure it was designed to protect.
August 4, 2025
PlayPraetor Android trojan infects >11k devices through sophisticated fraud campaign.
August 4, 2025
The UK’s legal aid sector is in turmoil after a cyber attack against the United Kingdom’s Legal Aid Agency (LAA).
August 4, 2025
Senate confirms Sean Cairncross at National Cyber Director.
August 4, 2025
New Plague backdoor silently bypasses authentication controls to maintain stealthy SSH access to targeted Linux systems.
August 3, 2025
China’s CL-STA-0969 group is targeting Southeast Asian telecommunications networks.
August 3, 2025
Anthropic revokes OpenAI’s access to Claude code ahead of long-awaited GPT-5 launch.
August 2, 2025
Anthropic dethrones OpenAI as the leading LLM provider for the Enterprise Sector.
August 2, 2025
A wave of attacks on SonicWall VPNs is exploiting a un-patched zero-day exploit to deploy Akira ransomware.
August 2, 2025
China accuses U.S. intelligence agencies of exploiting Microsoft zero-day vulnerability in cyberattack against key Chinense military enterprises.
August 1, 2025
Widespread PayPal and Venmo outage impacts millions across the U.S.
August 1, 2025
Pi-hole ad blocker discloses data breach linked to WordPress plugin vulnerability.
August 1, 2025
Microsoft will disable external Excel workbook links to blocked file types by the end of the year.
August 1, 2025
The common thread behind the Qantas, Allianz Life, and LVMH attacks – ShinyHunters.
August 1, 2025
Microsoft’s DragonV2.1Neural approaches near instantaneous vocal generation, raising security concerns over AI-driven speech synthesis.
August 1, 2025
Microsoft to pay big(ger) bucks for .Net bug bounty rewards. Up to $40k for critical vulnerabilities!
August 1, 2025
It’s a malware evasion technique called “Shade BIOS” – and it’s going to rock your world.
August 1, 2025
Storm-2603 Exploits SharePoint Flaws to Deliver Dual Ransomware via DNS-Controlled Backdoor
August 1, 2025
New report finds that in nearly all cases, threat actors target devices weeks before relevant vulnerabilities are made public.
August 1, 2025
Unprecedented $1 million prize offered at Pwn2Own Ireland 2025 for zero-click WhatsApp exploit.
August 1, 2025
Don't miss these
The latest cybersecurity news from across the Internet.
Everything you've ever wanted to know about privilege escalation
Cybersecurity checklist
Realtime Ransomware Live Feed
Drupal Core SQL bug exploited, urgent patching urged
Posted inCybersecurity News

Drupal Core SQL bug exploited, urgent patching urged

Actively exploited Drupal Core SQL injection flaw CVE-2026-9082 hits PostgreSQL-backed sites; patches are out and admins are urged to update fast.
Posted by Spartech Software May 23, 2026
SANS SEC670 sharpens Windows implant dev skills
Posted inCybersecurity News

SANS SEC670 sharpens Windows implant dev skills

SANS' SEC670 course is teaching red teamers stack-string and obfuscation tactics for building Windows implants, raising the bar for defenders.
Posted by Spartech Software May 23, 2026
First VPN cybercrime service dismantled in EU raid
Posted inCybersecurity News

First VPN cybercrime service dismantled in EU raid

European investigators have seized First VPN, a criminal infrastructure service allegedly used by ransomware crews and fraudsters, exposing 5,000 users.
Posted by Spartech Software May 22, 2026
CISA Faces Hill Scrutiny After Keys Leak on GitHub
Posted inCybersecurity News

CISA Faces Hill Scrutiny After Keys Leak on GitHub

Lawmakers demand answers after a contractor exposed AWS GovCloud keys and other CISA secrets on a public GitHub repo, raising security culture concerns.
Posted by Spartech Software May 22, 2026
Kimwolf DDoS botnet admin arrested in Canada sting
Posted inCybersecurity News

Kimwolf DDoS botnet admin arrested in Canada sting

US and Canadian authorities arrested alleged Kimwolf DDoS botnet admin Jacob Butler, tying him to a vast Android TV botnet-for-hire operation.
Posted by Spartech Software May 22, 2026
New multi-stage info-stealer hits Chromium browsers
Posted inCybersecurity News

New multi-stage info-stealer hits Chromium browsers

SANS ISC dissects a three-module malware that steals Chromium-based browser credentials, exfiltrates sensitive files, and opens a WebSocket backdoor.
Posted by Spartech Software May 22, 2026
Alleged Kimwolf IoT Botnet Boss Arrested in Canada
Posted inCybersecurity News

Alleged Kimwolf IoT Botnet Boss Arrested in Canada

Canadian police arrested a 23-year-old alleged administrator of the Kimwolf IoT botnet, which powered record DDoS attacks, amid ongoing U.S. cross-border probe.
Posted by Spartech Software May 22, 2026
GitHub breach tied to poisoned Nx VS Code extension
Posted inCybersecurity News

GitHub breach tied to poisoned Nx VS Code extension

GitHub says a poisoned VS Code extension on an employee device led to exfiltration of about 3,800 internal repos, likely via the compromised Nx Console.
Posted by Spartech Software May 21, 2026
GitHub probes TeamPCP claim of 4k internal repo breach
Posted inCybersecurity News

GitHub probes TeamPCP claim of 4k internal repo breach

GitHub is investigating claims by supply‑chain actor TeamPCP that it breached around 4,000 internal repositories, as researchers warn of wider fallout.
Posted by Spartech Software May 20, 2026
OAuth consent phishing PhaaS hits 340 Microsoft orgs
Posted inCybersecurity News

OAuth consent phishing PhaaS hits 340 Microsoft orgs

A new phishing-as-a-service platform abusing Microsoft OAuth device codes shows how attackers bypass MFA with consent tokens instead of passwords.
Posted by Spartech Software May 20, 2026

Posts pagination

1 2 3 … 64 Next page

Latest Posts

  • Drupal Core SQL bug exploited, urgent patching urged
  • SANS SEC670 sharpens Windows implant dev skills
  • First VPN cybercrime service dismantled in EU raid
  • CISA Faces Hill Scrutiny After Keys Leak on GitHub
  • Kimwolf DDoS botnet admin arrested in Canada sting

Ransomware Live

  • πŸ΄β€β˜ οΈ Auditteam has just published a new victim : Mopas Online Supermarket
  • πŸ΄β€β˜ οΈ Shinyhunters has just published a new victim : Baker Distributing Company
  • πŸ΄β€β˜ οΈ Shinyhunters has just published a new victim : Charter Communications, Inc.
  • πŸ΄β€β˜ οΈ Shinyhunters has just published a new victim : DentaQuest.com
  • πŸ΄β€β˜ οΈ Genesis has just published a new victim : **** & ********
  • πŸ΄β€β˜ οΈ Krybit has just published a new victim : lasevillanita.com
  • πŸ΄β€β˜ οΈ Nova has just published a new victim : AMACCAO
  • πŸ΄β€β˜ οΈ Nova has just published a new victim : Hoy Construction
  • πŸ΄β€β˜ οΈ Akira has just published a new victim : Gitis
  • πŸ΄β€β˜ οΈ Worldleaks has just published a new victim : BMJ Paperpack

Threat Level

High

Attack Statistics

United States ~59% of ransomware attacks globally
Thousands per year
Poland 1,000+ per week
Russia Highest cybercrime threat level
China Thousands per year
India 115% surge in attacks Q2 2024
Ukraine Significant surge since 2022
Brazil Among top countries for blocked attacks
Mexico 65% of businesses hit in 2024
Germany High targeted rate (EU)
France High targeted rate (EU)

Top attacking AS/N

AS NameASN
Bharat Sanchar Nigam Ltd9829
No.31,Jin-rong Street4134
CHINA UNICOM China169 Backbone4837
DigitalOcean, LLC14061
HUAWEI INTERNATIONAL PTE. LTD.136907
Amazon.com, Inc.14618
Alibaba (US) Technology Co., Ltd.45102
Google LLC396982
Amazon.com, Inc.16509
3xK Tech GmbH200373

Top attacking IP addresses

IP AddressNotable Exploits/Context
104.238.159.149SharePoint zero-day, broad exploitation
107.191.58.76SharePoint zero-day, government targets
96.9.125.147SharePoint, previously Ivanti exploits
139.162.47.194Exploits on CitrixBleed 2
38.180.148.215CitrixBleed 2 campaigns
185.224.128.17High activity, Netherlands
89.248.163.200High activity, Netherlands
15.235.218.150Associated with APT, active C2
45.9.148.114Associated with C2, malicious netflow
91.107.150.184C2 infrastructure, recent IoC

Visit our Friends

  • Bible Blender
  • Geek Slop
  • Pick Pony
You May Have Missed
Posted inAI/Machine Learning

What is Claude Code and why is it so popular with developers?

Posted by Spartech Software August 7, 2025
Posted inCybersecurity Defense

Black Hat USA vs. DEF CON: How do the two leading cybersecurity conferences differ and which one should I attend?

Posted by Spartech Software August 2, 2025
Posted inEncryption

WebAuthn PRF Encryption: Passkeys and WebAuthn – the next frontier for secure file encryption.

Posted by Spartech Software July 19, 2025
Computer hacker holding a large metal lock and key
Posted inEncryption

What are passkeys and how do they work? The future of secure, passwordless authentication.

Posted by Spartech Software July 11, 2025

About SparTech Software

  • Read about SparTech Software's cybersecurity services
  • Cybersecurity services request
  • Privacy Policy

Social Media

  • Facebook
  • Bluesky
  • Instagram
  • Pinterest
  • Threads
  • LinkedIn
  • Twitter

Contact Us

2345 Charles Ave
Burleson, TX 76028
Contact Us Form

Copyright 2026 β€” SparTech Software. All rights reserved.
Scroll to Top
×