Feb 19, 2025The Hacker NewsWindows Security / Malware
Users who are on the lookout for popular games were lured into downloading trojanized installers that...
Feb 19, 2025Ravie LakshmananThreat Intelligence / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto...
Feb 18, 2025Ravie LakshmananVulnerability / Network Security
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited,...
Feb 18, 2025Ravie LakshmananCyber Espionage / Malware
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to...
Feb 18, 2025Ravie LakshmananMalware / Network Security
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that...
Feb 18, 2025Ravie LakshmananThreat Intelligence / Malware
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple...
Feb 18, 2025The Hacker NewsArtificial Intelligence / Cyber Defense
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype...
Feb 18, 2025Ravie LakshmananVulnerability / Enterprise Security
Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to...