Apr 16, 2025Ravie LakshmananCyber Espionage / Network Security
Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as...
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper...
Apr 16, 2025Ravie LakshmananVulnerability Management / Incident Response
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities...
Apr 15, 2025Ravie LakshmananSupply Chain Attack / Malware
Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that's...
Apr 15, 2025Ravie LakshmananVulnerability / Software Security
A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that...
Apr 15, 2025Ravie LakshmananLinux / Malware
The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant...
Apr 15, 2025Ravie LakshmananArtificial Intelligence / Data Privacy
Meta has announced that it will begin to train its artificial intelligence (AI) models using public...