Senate confirms Trump’s national cyber director nominee
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. The U.S. Senate late Saturday confirmed Sean…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. The U.S. Senate late Saturday confirmed Sean…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Review: LLM Engineer’s HandbookFor all the excitement around LLMs, practical,…
New Linux backdoor Plague bypasses auth via malicious PAM module Pierluigi Paganini August 02, 2025 A stealthy Linux backdoor named Plague, hidden as a malicious…
China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions Pierluigi Paganini August 02, 2025 China questioned Nvidia over suspected backdoors in its…
A new and deceptive multi-stage malware campaign has been identified by the Lat61 Threat Intelligence team at security firm Point Wild. The attack uses a…
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control over compromised networks. Palo Alto…
Aug 02, 2025Ravie LakshmananThreat Detection / SSH Security Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection…
The US Department of Justice (DOJ) has officially launched a new compensation process for victims of human trafficking who were exploited through the Backpage website.…
A sophisticated cyberespionage campaign targeting foreign embassies in Moscow has been uncovered, revealing the deployment of a custom malware strain designed to manipulate digital trust…
A newly identified threat actor designated Storm-2603 has emerged as a sophisticated adversary in the ransomware landscape, leveraging advanced custom malware to circumvent endpoint security…
A significant security breach within the Qilin ransomware operation has provided unprecedented insight into the group’s affiliate network structure and operational methods. On July 31,…