Attack List 2025-  2026  2025  2024  2023  2021  2020  2019  2018

DATE

NAME

Info

CATEG.

WEB

7.12.25 A Practical Guide to Continuous Attack Surface Visibility Passive scan data goes stale fast as cloud assets shift daily, leaving teams blind to real exposures. Sprocket Security shows how continuous, automated recon gives accurate, up-to-date attack surface visibility. Attack

BleepingComputer

4.12.25 Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web Attack The Hacker News
18.11.25 Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 15.72 Attack The Hacker News
1.11.25 TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs Academic researchers developed a side-channel attack called TEE.Fail, which allows extracting secrets from the trusted execution environment in the CPU, the highly secure area of a system, such as Intel's SGX and TDX, and AMD's SEV-SNP. Attack

BleepingComputer

29.10.25 New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack called TEE.Fail that allows for the extraction of secrets from Attack

The Hacker News

27.10.25 New CoPhish attack steals OAuth tokens via Copilot Studio agents A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. Attack

BleepingComputer

26.10.25 Microsoft disables File Explorer preview for downloads to block attacks Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to block credential theft attacks via malicious documents. Attack

BleepingComputer

19.10.25 ConnectWise fixes Automate bug allowing AiTM update attacks ConnectWise released a security update to address vulnerabilities, one of them with critical severity, in Automate product that could expose sensitive communications to interception and modification. Attack

BleepingComputer

18.10.25 New Android Pixnapping attack steals MFA codes pixel-by-pixel A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content. Attack

BleepingComputer

12.10.25

New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim's system and bypassing security software. Attack

BleepingComputer

12.10.25

Google won’t fix new ASCII smuggling attack in Gemini Google has decided not to fix a new ASCII smuggling attack in Gemini that could be used to trick the AI assistant into providing users with fake information, alter the model's behavior, and silently poison its data. Attack

BleepingComputer

11.10.25

CommetJacking attack tricks Comet browser into stealing emails A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and Attack

BleepingComputer

3.10.25 New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard Attack The Hacker News
3.10.25 New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest defenses on Intel and AMD cloud Attack The Hacker News
27.9.25 Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack Cloudflare has mitigated a distributed denial-of-service (DDoS) attack that peaked at a record-breaking 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps). Attack

BleepingComputer

25.9.25 Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Attack The Hacker News
18.9.25 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix. Attack

BleepingComputer

16.9.25 Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from Attack The Hacker News
14.9.25 New VMScape attack breaks guest-host isolation on AMD, Intel CPUs A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU hypervisor process running on modern AMD or Intel CPUs. Attack

BleepingComputer

14.9.25 DDoS defender targeted in 1.5 Bpps denial-of-service attack A DDoS mitigation service provider in Europe was targeted in a massive distributed denial-of-service attack that reached 1.5 billion packets per second. Attack

BleepingComputer

14.9.25 Hackers left empty-handed after massive NPM supply-chain attack The largest supply-chain compromise in the history of the NPM ecosystem has impacted roughly 10% of all cloud environments, but attackers made little profit off it. Attack

BleepingComputer

10.9.25 BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets In Windows, the cornerstone of data protection is BitLocker, a Full Volume Encryption technology designed to secure sensitive data on disk. This ensures that even if an adversary gains physical access to the device, the data remains secure and inaccessible. Attack Techcommunity
6.9.25 Cloudflare hit by data breach in Salesloft Drift supply chain attack Cloudflare is the latest company impacted in a recent string of Salesloft Drift breaches, part of a supply-chain attack disclosed last week. Attack

BleepingComputer

6.9.25 Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps). Attack

BleepingComputer

4.9.25 Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second Attack The Hacker News
31.8.25 Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool Attack The Hacker News
27.8.25 New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). Attack The Hacker News
15.8.25
Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial- Attack The Hacker News
12.8.25 Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. "This allows remote Attack The Hacker News
20.7.25 Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack To quash speculation of a cyberattack or BGP hijack incident causing the recent 1.1.1.1 Resolver service outage, Cloudflare explains in a post mortem that the incident was caused by an internal misconfiguration. Attack

BleepingComputer

16.7.25 Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop from 20.5 million Attack The Hacker News
13.7.25 NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory. Attack

BleepingComputer

12.7.25 GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its Attack The Hacker News
10.7.25 AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. The flaws, Attack The Hacker News
23.6.25 Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. Attack BleepingComputer
20.6.25 Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per Attack The Hacker News
20.6.25 Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session Most cyberattacks today don't start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts. It's called " Living Attack The Hacker News
15.6.25 SmartAttack uses smartwatches to steal data from air-gapped systems A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped) systems. Attack

BleepingComputer

14.6.25 Brute-force attacks target Apache Tomcat management panels A coordinated campaign of brute-force attacks using hundreds of unique IP addresses targets Apache Tomcat Manager interfaces exposed online. Attack

BleepingComputer

13.6.25 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager Threat intelligence firm GreyNoise has warned of a "coordinated brute-force activity" targeting Apache Tomcat Manager interfaces. The company said it observed a Attack The Hacker News
7.6.25 Kerberos AS-REP roasting attacks: What you need to know Think your passwords are strong enough? AS-REP Roasting is back in the spotlight — and it's targeting weak spots in Active Directory. Learn more from Specops Software how attackers exploit missing Kerberos pre-auth and how to stop them with strong password policies. Attack

BleepingComputer

21.5.24 Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on mobile devices to a Chinese adult- Attack The Hacker News
3.5.24 Hackers abuse IPv6 networking feature to hijack software updates A China-aligned APT threat actor named "TheWizards" abuses an IPv6 networking feature to launch adversary-in-the-middle (AitM) attacks that hijack software updates to install Windows malware. Attack

BleepingComputer

27.4.25 Marks & Spencer pauses online orders after cyberattack British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack. Attack

BleepingComputer

25.4.25 Cookie-Bite attack PoC uses Chrome extension to steal session tokens A proof-of-concept attack called "Cookie-Bite" uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams. Attack

BleepingComputer

17.4.25 New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local Attack The Hacker News
11.4.25 Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a Attack The Hacker News

29.3.25

New npm attack poisons local packages with backdoors Two malicious packages were discovered on npm (Node package manager) that covertly patch legitimate, locally installed packages to inject a persistent reverse shell backdoor. Attack

BleepingComputer

15.3.25

X hit by 'massive cyberattack' amid Dark Storm's DDoS claims The Dark Storm hacktivist group claims to be behind DDoS attacks causing multiple X worldwide outages on Monday, leading the company to enable DDoS protections from Cloudflare. Attack BleepingComputer
9.3.25 Open-source tool 'Rayhunter' helps users detect Stingray attacks The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators (CSS), also known as IMSI catchers or Stingrays. Attack BleepingComputer
8.3.25 New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices. Attack BleepingComputer

12.1.25

New Web3 attack exploits transaction simulations to steal crypto Threat actors are employing a new tactic called "transaction simulation spoofing" to steal crypto, with one attack successfully stealing 143.45 Ethereum, worth approximately $460,000. Attack BleepingComputer

10.1.25

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple Attack The Hacker News

3.1.25

New DoubleClickjacking attack exploits double-clicks to hijack accounts A new variation of clickjacking attacks called "DoubleClickjacking" lets attackers trick users into authorizing sensitive actions using double-clicks while bypassing existing protections against these types of attacks. Attack BleepingComputer

2.1.25

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple Attack

The Hacker News