The new BPFDOOR controller allows stealth lateral movement in Linux server attacks
Cybersecurity researchers unearthed a new controller component related to a known backdoor…
A large portion of browser extensions can access sensitive enterprise data, a new report found
We know that browser extensions are embedded in the daily workflows of…
Critical Apache Roller Vulnerability (CVSS 10.0) allows for the persistence of malformed sessions
Apache Roller Open-Source, a Java-based blog server software, reveals a critical security…
How Google’s geospatial inference can change the response between crisis and climate
Google's latest advances in geospatial artificial intelligence (AI) are changing the way…
Chinese hackers target Linux systems using Snowlight malware and VShell tools
The China-related threat actor, known as UNC5174, is attributed to a new…
Targeted cryptographic developers for Python malware spoofing coding challenges
North Korea-related threat actors, rated as behind the massive Buybit Hack in…
Windows 0-Day, VPN exploits, weaponized AI, hijacked antivirus, etc.
The attacker is no longer waiting for the patch. They are invading…
Phishing campaigns use real-time checks to validate victim emails before credential theft
Cybersecurity researchers are bringing attention to a new type of qualification phishing…
The Resolverrat Campaign is targeted at healthcare and pharmaceutical companies via phishing and DLL sideloads
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called Resolverrat,…