Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware
29
Apr
2025

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux environments, exploiting weak or default SSH…

SentinelOne warns of threat actors targeting its systems and high-value clients
29
Apr
2025

SentinelOne warns of threat actors targeting its systems and high-value clients

SentinelOne warns of threat actors targeting its systems and high-value clients Pierluigi Paganini April 29, 2025 SentinelOne warns China-linked APT…

Hacker screens
29
Apr
2025

Hackers ramp up scans for leaked Git tokens and secrets

Threat actors are intensifying internet-wide scanning for Git configuration files that can reveal sensitive secrets and authentication tokens used to…

Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox
29
Apr
2025

Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox

A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to break out of the browser’s…

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
29
Apr
2025

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest Uyghur diaspora organization, using a weaponized…

10 Best Cybersecurity Names At RSA Conference 2025
29
Apr
2025

10 Best Cybersecurity Names At RSA Conference 2025

Who has the best cybersecurity name at the RSA Conference in San Francisco this year? It depends on who you…

Conceptual hacking background
29
Apr
2025

Amazon, CrowdStrike leaders say private threat intel can quickly bring cybercriminals to justice

SAN FRANCISCO — Threat intelligence flowing from private companies to cybersecurity authorities and law enforcement agencies is critical to the…

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi
29
Apr
2025

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi

A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active Apple devices and tens of…

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories
29
Apr
2025

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads and a Linux…

44% of the zero-days exploited in 2024 were in enterprise solutions
29
Apr
2025

44% of the zero-days exploited in 2024 were in enterprise solutions

In 2024, threat actors exploited 75 zero-days – i.e., vulnerabilities previously unknown to vendors, thus without a readily available patch…

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
29
Apr
2025

New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible…

Apple
29
Apr
2025

Apple ‘AirBorne’ flaws can lead to zero-click AirPlay RCE attacks

​A set of security vulnerabilities in Apple’s AirPlay Protocol and AirPlay Software Development Kit (SDK) exposed unpatched third-party and Apple…