Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems
Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. "Unlike other rootkit malware...
Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. "Unlike other rootkit malware...
Managed Detection and Response (MDR) has emerged as a crucial solution for organizations looking to bolster their security measures. MDR...
Vulnerable Redis services have been targeted by a "new, improved, dangerous" variant of a malware called SkidMap that's engineered to...
A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with...
In today's interconnected world, evolving security solutions to meet growing demand is more critical than ever. Collaboration across multiple solutions...
A group of academics has devised a "deep learning-based acoustic side-channel attack" that can be used to classify laptop keystrokes...
Two different North Korean nation-state actors have been linked to a cyber intrusion against NPO Mashinostroyeniya, a major Russian missile...
A malicious package that mimics the VMware vSphere connector module ‘vConnector’ was uploaded on the Python Package Index (PyPI) under...
PaperCut recently fixed a critical security vulnerability in its NG/MF print management software that allows unauthenticated attackers to gain remote...
The Federal Communications Commission (FCC) has announced a record-breaking $299,997,000 fine imposed on an international network of companies for placing...
Ransomware gangs continue to prioritize targeting VMware ESXi servers, with almost every active ransomware gang creating custom Linux encryptors for...
The FBI warned today of fraudsters posing as Non-Fungible Token (NFT) developers to prey upon NFT enthusiasts and steal their...
The Google Cloud security team acknowledged a common tactic known as versioning used by malicious actors to slip malware on...
Over half (55%) of public cloud compromises investigated by Google in the first three months of the year were down...
The government has warned that a serious cyber-attack on UK critical infrastructure has a 5–25% chance of happening over the...
Security agencies from the Five Eyes intelligence alliance yesterday released their list of the 12 most exploited vulnerabilities of 2022,...
Sporting events and venues are increasingly vulnerable to cyber-attacks, a new study from Microsoft has found.The Microsoft Threat Intelligence State...
The Cybersecurity and Infrastructure Security Agency (CISA) has released its FY2024-2026 Strategic Plan, which builds on the cybersecurity strategy published...
A new malicious campaign has been found on the Python Package Index (PyPI) open-source repository involving 24 malicious packages that...
A stealthy malware has been discovered on npm, the popular package manager for JavaScript, that poses a severe threat by...
A sophisticated email phishing campaign has been discovered by security researchers, exploiting a zero-day vulnerability in Salesforce’s email services and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
A married couple from New York City has pleaded guilty to money laundering charges in connection with the 2016 hack...
Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate...