Reptile Rootkit employed in attacks against Linux systems in South Korea
Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea.…
Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea.…
Researchers discovered a vulnerability in PaperCut NG/MF print management software that can lead to remote code execution. Cybersecurity researchers at…
Welcome to the 3rd post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a…
A cyberattack has disrupted the computer systems of multiple hospitals in several states, with a severe impact on their operations.…
I had no idea that squid contain sufficient oil to be worth extracting. As usual, you can also use this…
A married couple from New York pleaded guilty this week to laundering billions of dollars stolen from Bitfinex in 2016.…
Researchers discovered a new set of malicious packages on the npm package manager that can exfiltrate sensitive developer data. On…
ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our…
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store.…
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities…