A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within…
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within…
Alphabet has reopened discussions to acquire cybersecurity startup Wiz in a potential Wiz acquisition deal worth $30 billion. This follows a failed attempt last year…
Google has officially launched OSV-Scanner V2.0.0, a major upgrade to its open-source vulnerability scanning tool. Released on March 17, 2025, this new version represents a…
A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability is located in the TCP…
To date, we have seen numerous cyberattacks targeting critical infrastructure such as hospitals, power grids, water utilities, and even nuclear plants. However, it’s less common…
In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on balancing…
Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According to a recent threat assessment…
In the ever-evolving landscape of cybersecurity, one of the most alarming and dangerous threats is the Zero-Day attack. These attacks exploit vulnerabilities in software or…
The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically…
Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software ecosystems. This update follows the…
Do you need to permanently and securely delete photos from an iPhone to prevent unauthorized access? Simply deleting them isn’t always enough, as they can…
A series of vulnerabilities has been discovered in Espressif Systems’ ESP32 devices, specifically affecting the BluFi module within the ESP-IDF framework. BluFi is designed to…