A cyberespionage group, tracked as Witchetty, used steganography to hide a previously undocumented backdoor in a Windows logo. Broadcom's Symantec…
The US Department of Defense (DoD) shared the results of the Hack US bug bounty program that took place in July.…
Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild.…
Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used…
The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat…
A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs…
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an…
The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique…
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild.…
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new…
This website uses cookies.