Attackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting individuals and organizations. Leveraging the inherent…
KEY SUMMARY POINTS New Linux Malware Campaign: Cybersecurity researchers identified an active Linux malware campaign leveraging eBPF technology and targeting…
Dec 18, 2024Ravie LakshmananEmail Security / Cloud Security Cybersecurity researchers have disclosed a new phishing campaign that has targeted European…
Interpol calls on the cybersecurity community, law enforcement, and the media to stop using the term “Pig Butchering” when referring…
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux…
XRefer, an IDA Pro plugin, enhances binary analysis with a persistent companion view by employing Gemini-powered cluster analysis to decompose…
KEY SUMMARY POINTS New Linux Malware Campaign: Cybersecurity researchers identified an active Linux malware campaign leveraging eBPF technology and targeting…
IntelBroker, a notorious hacker group based in Serbia, has a history of breaching the servers of major companies like Apple…
Dec 18, 2024Ravie LakshmananSaaS Security / Incident Response BeyondTrust has disclosed details of a critical security flaw in Privileged Remote…
Body-worn video provider Axon is still in possession of the encryption keys for a major Police Scotland cloud IT project,…
Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting…
Researchers have uncovered vulnerabilities in Microsoft Azure Data Factory’s integration with Apache Airflow, which could potentially allow attackers to gain…











