Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack
Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite...
Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite...
Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin....
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by...
Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" gone offline as of April 1, 2025, prompting concerns among...
Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to...
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over...
Reports out this week indicate that HiddenLayer experts have uncovered a tactic for injecting prompts that can evade all the...
A team of cybersecurity experts has revealed three vulnerabilities in the Rack Ruby web server interface that, if exploited effectively,...
Reports from cybersecurity analysts indicate the emergence of a fresh malware labeled as DslogdRAT that infiltrates systems through an unpatched...
Security experts at ARMO have uncovered a critical vulnerability within the Linux operating system, creating a significant gap in runtime...
Cybersecurity analysts have showcased an evidence-of-exploit (EoE) rootkit named Curing which utilizes a Linux non-blocking I/O technique named io_uring to...
Security analysts have outlined four distinct weaknesses in a fundamental aspect of the Windows task planning function that could be...
Concerns are being raised by security analysts and developers about the dangers of "slopsquatting," a novel type of supply chain...
In the realm of cybersecurity, experts have discovered a fresh ruling element linked to a notorious secret passage known as...
Below are the comments from Microsoft for researchers interested in similar research endeavors: Breaching Microsoft Azure Bounty Rules of Engagement...