No menu items!
No menu items!
More

    THN

    New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

    Apr 16, 2025Ravie LakshmananCyber Espionage / Network Security Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as...

    Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

    Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper...

    U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert

    Apr 16, 2025Ravie LakshmananVulnerability Management / Incident Response The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities...

    Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

    Apr 15, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that's...

    Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

    Apr 15, 2025Ravie LakshmananVulnerability / Software Security A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that...

    Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

    Apr 15, 2025Ravie LakshmananLinux / Malware The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant...

    Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

    Apr 15, 2025The Hacker NewsData Privacy / Enterprise Security Everybody knows browser extensions are embedded into nearly every user's daily workflow, from spell checkers...

    Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

    The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a malicious campaign...

    Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval

    Apr 15, 2025Ravie LakshmananArtificial Intelligence / Data Privacy Meta has announced that it will begin to train its artificial intelligence (AI) models using public...

    Latest articles

    spot_imgspot_img