Kali Linux 2026.1 Released With 8 New Hacking Tools
Kali Linux 2026.1 has officially been released, marking the first major update of the year for the popular penetration testing distribution. Designed for professionals engaged…
Kali Linux 2026.1 has officially been released, marking the first major update of the year for the popular penetration testing distribution. Designed for professionals engaged…
CanisterWorm’s latest evolution turns TeamPCP’s cloud-native toolkit into a geopolitically tuned wiper, capable of bricking entire Kubernetes clusters when it lands on systems configured for…
The AI supply chain is sprawling, opaque, and complex, making it hard to secure. No single solution provides total protection, but some platforms cover more…
Organizations have spent years accumulating fragmented identity systems: too many roles, too many credentials, too many disconnected tools. For a workforce of humans, that fragmentation…
Ravie LakshmananMar 24, 2026Endpoint Security / Social Engineering A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related…
The US Federal Communications Commission (FCC) has moved to ban consumer-grade routers made outside the US following a determination that such hardware poses an unacceptable…
An independent review of an Australian law for securing critical infrastructure sectors has found it “toothless”, with penalties viewed as a “cost of doing business”…
Citrix NetScaler critical flaw could leak data, update now Pierluigi Paganini March 24, 2026 Citrix warns of a critical NetScaler flaw (CVE-2026-3055) that could leak…
Publicly naming a hacking group can affect everything from retaliation to insurance coverage. Source link
Leaked iOS spyware has some cybersecurity professionals raising urgent alarms about potential mass iPhone compromises, a development that pairs ominously with the recent discovery of…
Executive Summary Since August 2025, Unit 42 has tracked a series of sophisticated phishing campaigns where attackers impersonate Palo Alto Networks talent acquisition staff. These…
The RAT module maintains regular communication with an attacker-controlled C2 server, executing commands to terminate its own process, change the working directory, list files and…