Technology

The new BPFDOOR controller allows stealth lateral movement in Linux server attacks

Cybersecurity researchers unearthed a new controller component related to a known backdoor…

4 Min Read

A large portion of browser extensions can access sensitive enterprise data, a new report found

We know that browser extensions are embedded in the daily workflows of…

5 Min Read

Critical Apache Roller Vulnerability (CVSS 10.0) allows for the persistence of malformed sessions

Apache Roller Open-Source, a Java-based blog server software, reveals a critical security…

2 Min Read

How Google’s geospatial inference can change the response between crisis and climate

Google's latest advances in geospatial artificial intelligence (AI) are changing the way…

9 Min Read

Chinese hackers target Linux systems using Snowlight malware and VShell tools

The China-related threat actor, known as UNC5174, is attributed to a new…

4 Min Read

Targeted cryptographic developers for Python malware spoofing coding challenges

North Korea-related threat actors, rated as behind the massive Buybit Hack in…

5 Min Read

Windows 0-Day, VPN exploits, weaponized AI, hijacked antivirus, etc.

The attacker is no longer waiting for the patch. They are invading…

24 Min Read

Phishing campaigns use real-time checks to validate victim emails before credential theft

Cybersecurity researchers are bringing attention to a new type of qualification phishing…

4 Min Read

The Resolverrat Campaign is targeted at healthcare and pharmaceutical companies via phishing and DLL sideloads

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called Resolverrat,…

4 Min Read