The Rules File Backdoor attack targets AI code editors like GitHub Copilot and Cursor, making them inject malicious code via…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog. The U.S.…
Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government…
Microsoft discovered a new remote access trojan (RAT), dubbed StilachiRAT, that uses sophisticated techniques to avoid detection. In November 2024,…
Threat actors began exploiting a recently disclosed Apache Tomcat vulnerability immediately after the release of a PoC exploit code. A…
Threat actors exploit Cascading Style Sheets (CSS) to bypass spam filters and detection engines, and track users’ actions and preferences. …
A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force. Security…
Denmark 's cybersecurity agency warns of increased state-sponsored campaigns targeting the European telecom companies Denmark raised the cyber espionage threat…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Undercover…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
This website uses cookies.