EDR tools aren't scanning Linux sandbox environments on Windows, giving cybercriminals a unique opportunity to work ...
The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start of 2025, barring January, with the number of postings on ...
Being the kind of technical person you are, you most likely identify with the old-time hacker ethic and disdain the popular use of the word “hacker” when “cracker” would be more apropos. … Being the ...
Ten typosquatted npm packages (Jul 4, 2025) delivered a 24MB PyInstaller info stealer using 4 obfuscation layers; ~9,900 ...
ESET researchers have recently discovered a new Linux backdoor, named WolfsBane, that is being used by the China-aligned Gelsemium APT group. This is the first known instance of Gelsemium using Linux ...
LinkPro uses Linux’s own eBPF feature to stay invisible, redefining cyber espionage and proving that even Linux systems are ...
A hacker outfit identified as UNC2891 tried pulling off a bank heist by slipping a 4G-enabled Raspberry Pi into a bank’s ATM network and using a tricked-out Linux rootkit to stay hidden. According to ...
The North Korean cyber-espionage group Kimsuki, linked to the military intelligence agency Reconnaissance General Bureau (RGB), has unveiled a new Linux malware known as Gomir. This malware is a ...
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results