Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom,…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers…

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed…

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a…

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in "mass scanning, credential…

Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

Threat actors are leveraging an e-crime tool called Atlantis AIO…

Microsoft: 6 Zero-Days in March 2025 Patch Tuesday

Microsoft today issued more than 50 security updates for its…

Critical Chrome Vulnerability Exposes Users to Data Theft and Unauthorized Access

A critical security vulnerability has been discovered in Google Chrome,…

Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws Resolved

Post Content ​The original article found on darkreading Read More

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands

A sophisticated phishing operation has emerged that creatively leverages DNS…