Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom,…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers…

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed…

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a…

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in "mass scanning, credential…

Cybercrime’s Cobalt Strike Use Plummets 80% Worldwide

Fortra, Microsoft, and Health-ISAC have combined forces to claw back…

Artificial Intelligence – What’s all the fuss?

Talking about AI: Definitions Artificial Intelligence (AI) — AI refers…

Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code

A severe vulnerability in Synology’s DiskStation Manager (DSM) allows remote…

CISA Warns of Microsoft Windows Management Console (MMC) Vulnerability Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an…

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

Cheap Android smartphones manufactured by Chinese companies have been observed…