Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom,…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers…

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed…

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a…

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Cybersecurity researchers have disclosed a surge in "mass scanning, credential…

Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds

Organizations today face an ever-expanding threat landscape that requires sophisticated…

Hackers Abuse COM Objects for Fileless Malware Lateral Movements

A sophisticated technique was recently detected by researchers where attackers…

200 Unique Domains Used by Raspberry Robin Unveiled

Raspberry Robin, a complex and evolving malware threat, has been…

CISA Warns of Supply-Chain Attack Targeting Widely-Used GitHub Action Vulnerability

CISA warns of a critical vulnerability affecting the popular GitHub…

‘EncryptHub’ OPSEC Failures Reveal TTPs & Big Plans

Is EncryptHub the most prolific cybercriminal in recent history? Or,…