For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub ...
Compare the top 5 Linux-friendly network security providers for small businesses. Discover reliable tools, features, and protection solutions designed for Linux environments.
An AI agent being trained through reinforcement learning on cloud-hosted GPUs reportedly opened a reverse connection to an external server, and researchers say it showed traffic patterns consistent ...
Semantic versioning gives PowerShell script changes clear meaning so you can evolve scripts quickly without letting updates devolve into chaos.
New ClickFix variant maps WebDAV drive to run trojanized WorkFlowy app, enabling stealth C2 beacon and payload delivery.
A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware ...
As enterprises increasing depend on cloud services, living off the land has evolved into living off the cloud.
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
You've been typing the wrong commands for years. Linux moved on, and nobody bothered to tell you.