Ukraine’s cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of public disclosure, targeting government agencies with…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…
I started to have a look at Libreoffice and discovered a way to achieve remote code execution as soon as…
The phrase “Move fast and break things” is a guiding philosophy in the technology industry. The phrase was coined by…
China is looking to escalate measures against cybercriminals operating inside and outside its borders by banning convicted citizens from leaving…
Microsoft has fixed a known issue that was causing the password sign-in option to disappear from the lock screen options…
With less than a week to go until the start of the 2026 Milano Cortina Winter Olympics in Italy, the…
A sophisticated fileless Linux malware framework, ShadowHS, that represents a significant evolution in post-exploitation tooling. Unlike traditional malware binaries, ShadowHS…
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger,…
“Use ImageMagick® to create, edit, compose, or convert bitmap images. It can read and write images in a variety of…
Threat actors are actively targeting internet-exposed MongoDB instances in large-scale automated ransomware campaigns. The attacks follow a consistent pattern: attackers…
Notepad++ fell victim to a sophisticated supply chain attack orchestrated by state-sponsored threat actors who compromised its update infrastructure over…
