According to a recent Forescout analysis, open-source models were significantly less successful in vulnerability research than commercial and underground models. ​The original article found on […]
Fortinet Products Are in the Crosshairs Again
The company disclosed a critical FortiSIEM flaw with a PoC exploit for it the same week researchers warned of an ominous surge in malicious traffic […]
Whispers of XZ Utils Backdoor Live on in Old Docker Images
Developers maintaining the images made the “intentional choice” to leave the artifacts available as “a historical curiosity,” given the improbability they’d be exploited. ​The original […]
Russian APT group Curly COMrades employs novel backdoor and persistence tricks
Researchers have observed new cyberespionage campaigns against key organizations from EU-hopefuls Moldova and Georgia using a previously unknown backdoor program and novel persistence techniques. Absent […]
Emerging AI-Driven Phishing Trends Reshape Cybercrime Tactics
Artificial intelligence (AI) in advances and adaptive social engineering techniques have led to a significant revolution in phishing and scams within the continually changing realm […]
Infamous XZ Backdoor Found Hidden in Docker Images for Over a Year
Security researchers at Binarly have discovered that the sophisticated supply chain hack still exists in publicly accessible Docker images on Docker Hub, more than a […]
Google’s Android pKVM Framework Achieves SESIP Level 5 Certification
Google has revealed that protected KVM (pKVM), the hypervisor that powers the Android Virtualization Framework (AVF), has achieved SESIP Level 5 certification, marking a major […]
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with a multi-stage malware framework called PS1Bot. “PS1Bot features a modular design, […]
Critical SSH vulnerabilities expose enterprise network infrastructure as patching lags
The Secure Shell (SSH) protocol serves as the backbone of modern network administration, providing encrypted remote access to virtually every server, network device and embedded system […]
DEF CON research takes aim at ZTNA, calls it a bust
Zero Trust Network Access (ZTNA) has been promoted by vendors over the last several years as a foundational approach for network security. The basic premise […]