New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server
A newly discovered malware called ZiChatBot has been found quietly using the REST APIs of a legitimate team chat application called Zulip to receive and…
A newly discovered malware called ZiChatBot has been found quietly using the REST APIs of a legitimate team chat application called Zulip to receive and…
If your organisation runs quarterly vulnerability scans and calls it penetration testing, you are not alone. According to a 2025 SANS Institute survey, over 60%…
A newly observed Linux backdoor technique, dubbed Pam, is exploiting the flexibility of Pluggable Authentication Modules (PAM) to capture SSH credentials and maintain persistence on compromised…
Cybersecurity researchers from LayerX have found a major security flaw in the Claude for Chrome browser extension that could allow hackers to take full control…
08 May Why The CISO Role Is Becoming More Demanding In 2026 Posted at 10:09h in Blogs by Taylor Fox This week in cybersecurity from…
A week after Copy Fail, another Linux local privilege escalation vulnerability dubbed “Dirty Frag” has been revealed, along with a PoC exploit. What is Dirty…
Some time ago, we discussed whether you should allow your browser to remember your passwords. In that article we mentioned the importance of encryption. “With…
Ravie LakshmananMay 08, 2026Linux / DevOps A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers’ systems to establish a silent foothold…
In the existing state, identity is human-centric. Today’s identity and access management (IAM) systems were designed for a world dominated by human users and static…
The rollout of the UK’s Online Safety Act in July 2025 was intended to create a safer digital environment for children through stricter age verification…
Australian universities and TAFEs have joined global counterparts in scrambling to understand their potential exposure to a cyber incident involving a popular learning management system.…
Poland’s Internal Security Agency (ABW) has documented a significant escalation in cyberattacks targeting industrial control systems (ICS) and other operational technology (OT) infrastructure during 2024…