Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom,…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers…

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed…

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a…

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in "mass scanning, credential…

New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials – Unofficial Patch

A critical vulnerability affecting all Windows operating systems from Windows…

Intel’s Secure Data Tunnel Moves AI Training Models to Data Sources

The chip maker's Tiber Secure Federated AI service creates a…

How Democratized Development Creates a Security Nightmare

No-code and low-code platforms offer undeniable benefits. But when security…

Ransomware Attacks Build Against Saudi Construction Firms

Cybercriminals are ramping up their efforts in the Kingdom and…

China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks

Researchers discovered new variants of the malware, which is tied…