Attack List 2025- 2026 2025 2024 2023 2021 2020 2019 2018
DATE |
NAME |
Info | CATEG. |
WEB |
| 7.12.25 | A Practical Guide to Continuous Attack Surface Visibility | Passive scan data goes stale fast as cloud assets shift daily, leaving teams blind to real exposures. Sprocket Security shows how continuous, automated recon gives accurate, up-to-date attack surface visibility. | Attack | |
| 4.12.25 | Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts | Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web | Attack | The Hacker News |
| 18.11.25 | Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet | Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 15.72 | Attack | The Hacker News |
| 1.11.25 | TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs | Academic researchers developed a side-channel attack called TEE.Fail, which allows extracting secrets from the trusted execution environment in the CPU, the highly secure area of a system, such as Intel's SGX and TDX, and AMD's SEV-SNP. | Attack | |
| 29.10.25 | New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves | A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack called TEE.Fail that allows for the extraction of secrets from | Attack | |
| 27.10.25 | New CoPhish attack steals OAuth tokens via Copilot Studio agents | A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. | Attack | |
| 26.10.25 | Microsoft disables File Explorer preview for downloads to block attacks | Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to block credential theft attacks via malicious documents. | Attack | |
| 19.10.25 | ConnectWise fixes Automate bug allowing AiTM update attacks | ConnectWise released a security update to address vulnerabilities, one of them with critical severity, in Automate product that could expose sensitive communications to interception and modification. | Attack | |
| 18.10.25 | New Android Pixnapping attack steals MFA codes pixel-by-pixel | A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content. | Attack | |
|
12.10.25 |
New FileFix attack uses cache smuggling to evade security software | A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim's system and bypassing security software. | Attack | |
|
12.10.25 |
Google won’t fix new ASCII smuggling attack in Gemini | Google has decided not to fix a new ASCII smuggling attack in Gemini that could be used to trick the AI assistant into providing users with fake information, alter the model's behavior, and silently poison its data. | Attack | |
|
11.10.25 |
CommetJacking attack tricks Comet browser into stealing emails | A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and | Attack | |
| 3.10.25 | New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer | In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel's Software Guard | Attack | The Hacker News |
| 3.10.25 | New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections | A group of academics from KU Leuven and the University of Birmingham has demonstrated a new vulnerability called Battering RAM to bypass the latest defenses on Intel and AMD cloud | Attack | The Hacker News |
| 27.9.25 | Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack | Cloudflare has mitigated a distributed denial-of-service (DDoS) attack that peaked at a record-breaking 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps). | Attack | |
| 25.9.25 | Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds | The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 | Attack | The Hacker News |
| 18.9.25 | New Phoenix attack bypasses Rowhammer defenses in DDR5 memory | Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix. | Attack | |
| 16.9.25 | Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds | A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5) memory chips from | Attack | The Hacker News |
| 14.9.25 | New VMScape attack breaks guest-host isolation on AMD, Intel CPUs | A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU hypervisor process running on modern AMD or Intel CPUs. | Attack | |
| 14.9.25 | DDoS defender targeted in 1.5 Bpps denial-of-service attack | A DDoS mitigation service provider in Europe was targeted in a massive distributed denial-of-service attack that reached 1.5 billion packets per second. | Attack | |
| 14.9.25 | Hackers left empty-handed after massive NPM supply-chain attack | The largest supply-chain compromise in the history of the NPM ecosystem has impacted roughly 10% of all cloud environments, but attackers made little profit off it. | Attack | |
| 10.9.25 | BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets | In Windows, the cornerstone of data protection is BitLocker, a Full Volume Encryption technology designed to secure sensitive data on disk. This ensures that even if an adversary gains physical access to the device, the data remains secure and inaccessible. | Attack | Techcommunity |
| 6.9.25 | Cloudflare hit by data breach in Salesloft Drift supply chain attack | Cloudflare is the latest company impacted in a recent string of Salesloft Drift breaches, part of a supply-chain attack disclosed last week. | Attack | |
| 6.9.25 | Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps | Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps). | Attack | |
| 4.9.25 | Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack | Cloudflare on Tuesday said it automatically mitigated a record-setting volumetric distributed denial-of-service (DDoS) attack that peaked at 11.5 terabits per second | Attack | The Hacker News |
| 31.8.25 | Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling | Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring and digital forensic tool | Attack | The Hacker News |
| 27.8.25 | New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station | A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB). | Attack | The Hacker News |
| 15.8.25 | Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial- | Attack | The Hacker News | |
| 12.8.25 | Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks | Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. "This allows remote | Attack | The Hacker News |
| 20.7.25 | Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack | To quash speculation of a cyberattack or BGP hijack incident causing the recent 1.1.1.1 Resolver service outage, Cloudflare explains in a post mortem that the incident was caused by an internal misconfiguration. | Attack | |
| 16.7.25 | Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors | Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of 2025, a significant drop from 20.5 million | Attack | The Hacker News |
| 13.7.25 | NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks | NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory. | Attack | |
| 12.7.25 | GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs | NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its | Attack | The Hacker News |
| 10.7.25 | AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs | Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. The flaws, | Attack | The Hacker News |
| 23.6.25 | Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider | Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. | Attack | BleepingComputer |
| 20.6.25 | Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider | Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per | Attack | The Hacker News |
| 20.6.25 | Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session | Most cyberattacks today don't start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts. It's called " Living | Attack | The Hacker News |
| 15.6.25 | SmartAttack uses smartwatches to steal data from air-gapped systems | A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped) systems. | Attack | |
| 14.6.25 | Brute-force attacks target Apache Tomcat management panels | A coordinated campaign of brute-force attacks using hundreds of unique IP addresses targets Apache Tomcat Manager interfaces exposed online. | Attack | |
| 13.6.25 | 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager | Threat intelligence firm GreyNoise has warned of a "coordinated brute-force activity" targeting Apache Tomcat Manager interfaces. The company said it observed a | Attack | The Hacker News |
| 7.6.25 | Kerberos AS-REP roasting attacks: What you need to know | Think your passwords are strong enough? AS-REP Roasting is back in the spotlight — and it's targeting weak spots in Active Directory. Learn more from Specops Software how attackers exploit missing Kerberos pre-auth and how to stop them with strong password policies. | Attack | |
| 21.5.24 | Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps | Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on mobile devices to a Chinese adult- | Attack | The Hacker News |
| 3.5.24 | Hackers abuse IPv6 networking feature to hijack software updates | A China-aligned APT threat actor named "TheWizards" abuses an IPv6 networking feature to launch adversary-in-the-middle (AitM) attacks that hijack software updates to install Windows malware. | Attack | |
| 27.4.25 | Marks & Spencer pauses online orders after cyberattack | British retailer giant Marks & Spencer (M&S) has suspended online orders while working to recover from a recently disclosed cyberattack. | Attack | |
| 25.4.25 | Cookie-Bite attack PoC uses Chrome extension to steal session tokens | A proof-of-concept attack called "Cookie-Bite" uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams. | Attack | |
| 17.4.25 | New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs | Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local | Attack | The Hacker News |
| 11.4.25 | Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways | Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a | Attack | The Hacker News |
|
29.3.25 |
New npm attack poisons local packages with backdoors | Two malicious packages were discovered on npm (Node package manager) that covertly patch legitimate, locally installed packages to inject a persistent reverse shell backdoor. | Attack | |
|
15.3.25 |
X hit by 'massive cyberattack' amid Dark Storm's DDoS claims | The Dark Storm hacktivist group claims to be behind DDoS attacks causing multiple X worldwide outages on Monday, leading the company to enable DDoS protections from Cloudflare. | Attack | BleepingComputer |
| 9.3.25 | Open-source tool 'Rayhunter' helps users detect Stingray attacks | The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators (CSS), also known as IMSI catchers or Stingrays. | Attack | BleepingComputer |
| 8.3.25 | New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint | A newly uncovered ClickFix phishing campaign is tricking victims into executing malicious PowerShell commands that deploy the Havok post-exploitation framework for remote access to compromised devices. | Attack | BleepingComputer |
|
12.1.25 | New Web3 attack exploits transaction simulations to steal crypto | Threat actors are employing a new tactic called "transaction simulation spoofing" to steal crypto, with one attack successfully stealing 143.45 Ethereum, worth approximately $460,000. | Attack | BleepingComputer |
|
10.1.25 | Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them | In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple | Attack | The Hacker News |
|
3.1.25 | New DoubleClickjacking attack exploits double-clicks to hijack accounts | A new variation of clickjacking attacks called "DoubleClickjacking" lets attackers trick users into authorizing sensitive actions using double-clicks while bypassing existing protections against these types of attacks. | Attack | BleepingComputer |
|
2.1.25 | Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them | In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple | Attack | |