Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that […]
Developers Beware! Fake Coding Challenges Will Deploy FogDoor on Your System
A sophisticated malware campaign targeting software developers has emerged, leveraging fake coding challenges to infiltrate systems with a stealthy backdoor dubbed FogDoor. First identified in […]
Best MDR (Managed Detection & Response) Solutions in 2025
The best Managed Detection and Response (MDR) solutions are designed to enhance an organization’s cybersecurity posture by providing comprehensive threat detection and response capabilities. These […]
Linux Kernel 6.14 Officially Released, What’s New
Linus Torvalds has officially announced the release of Linux kernel 6.14, the latest stable version of the open-source operating system kernel. Originally expected on Sunday, […]
New Phishing Attack Using Browser-In-The-Browser Technique To Attack Gamers
A sophisticated new phishing campaign has emerged targeting the gaming community, specifically Counter-Strike 2 players, using an advanced technique known as Browser-in-the-Browser (BitB). This attack […]
Chinese Hacker Group Tracked Back to iSoon APT Operation
The group, called FishMonger or Aquatic Panda, is working under contract for the Chinese government to steal data from governmental organizations, Catholic charities, NGOs, think […]
China-Nexus APT ‘Weaver Ant’ Caught in Yearslong Web Shell Attack
The persistent threat actor was caught using sophisticated Web shell techniques against an unnamed telecommunications company in Asia. ​The original article found on darkreading Read […]
Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication
A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, […]
Critical ‘IngressNightmare’ Vulns Imperil Kubernetes Environments
More than 40% of all Internet-facing container orchestration clusters are at risk. ​The original article found on darkreading Read More
FBI Warns of Document Converter Tools Due to Uptick in Scams
The FBI’s Denver field office says the tools will convert documents while also dropping malware and scraping users’ systems for sensitive data. ​The original article […]