Mar 18, 2025Ravie LakshmananCyber Espionage / Malware
Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace...
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and...
Mar 17, 2025Ravie LakshmananVulnerability / Web Security
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following...
Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the...
Mar 17, 2025Ravie LakshmananBotnet / Vulnerability
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver...
Mar 17, 2025The Hacker NewsCloud Security / Threat Intelligence
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is...
Mar 17, 2025Ravie LakshmananCybersecurity / Hacking News
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week's cybersecurity landscape is a...
Mar 17, 2025Ravie LakshmananVulnerability / Cloud Security
Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised...