Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
18
Mar
2025

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

New StilachiRAT uses sophisticated techniques to avoid detection
18
Mar
2025

New StilachiRAT uses sophisticated techniques to avoid detection

New StilachiRAT uses sophisticated techniques to avoid detection Pierluigi Paganini March 18, 2025 Microsoft discovered a new remote access trojan…

Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit
18
Mar
2025

Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit

Security researchers have confirmed that a critical remote code execution (RCE) vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being…

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams
18
Mar
2025

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to…

StilachiRAT Targeting Credentials and Crypto Wallets
18
Mar
2025

A Stealthy RAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to…

Wiz acquisition
18
Mar
2025

Alphabet Revives $30 Billion Deal

Alphabet has reopened discussions to acquire cybersecurity startup Wiz in a potential Wiz acquisition deal worth $30 billion. This follows…

Google Released Open Source Version of OSV-Scanner Tool for Vulnerability Scanning
18
Mar
2025

Google Released Open Source Version of OSV-Scanner Tool for Vulnerability Scanning

Google has officially launched OSV-Scanner V2.0.0, a major upgrade to its open-source vulnerability scanning tool.  Released on March 17, 2025,…

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability
18
Mar
2025

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability…

Naveen Goud
18
Mar
2025

Cyber Attack halts a murder shooting trial in American court

To date, we have seen numerous cyberattacks targeting critical infrastructure such as hospitals, power grids, water utilities, and even nuclear…

How financial institutions can minimize their attack surface
18
Mar
2025

How financial institutions can minimize their attack surface

In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He…

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector
18
Mar
2025

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector

Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According…

Naveen Goud
18
Mar
2025

How to Identify Zero-Day Attacks and Their Repercussions

In the ever-evolving landscape of cybersecurity, one of the most alarming and dangerous threats is the Zero-Day attack. These attacks…