New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods
13
Dec
2024

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and…

Jane Devry
13
Dec
2024

Black Hat Europe Recap: Auguria Debuts Newly Enhanced Platform

This year’s Black Hat Europe showcased the latest advancements in research, developments and emerging trends in cybersecurity. Being surrounded by…

Linux Rootkit PUMAKIT
13
Dec
2024

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Dec 13, 2024Ravie LakshmananLinux / Threat Analysis Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with…

Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems
13
Dec
2024

Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems

Dell has recently disclosed two critical security vulnerabilities affecting a wide range of its products, potentially exposing numerous systems to…

Jane Devry
13
Dec
2024

The three top cybersecurity predictions for 2025

The cyberthreat landscape has shifted rapidly over the past several years, and this evolution will continue in 2025. AI has…

The key to ensuring software quality and reliability
13
Dec
2024

The key to ensuring software quality and reliability

Regression testing is a crucial part of software development that ensures new code changes don’t negatively affect existing functionality. It…

Jane Devry
13
Dec
2024

How the Cyber Grinch Stole Christmas: Safeguard Your Festive Season

The holiday season is a time for celebration, with organisations hosting festive parties and employees spending time with family. However,…

Experts discovered the first mobile malware families linked to Russia's Gamaredon
13
Dec
2024

Experts discovered the first mobile malware families linked to Russia’s Gamaredon

Experts discovered the first mobile malware families linked to Russia’s Gamaredon Pierluigi Paganini December 13, 2024 The Russia-linked APT Gamaredon…

Jane Devry
13
Dec
2024

How AI will both threaten and protect data in 2025

As we move into 2025, generative AI and other emerging technologies are reshaping how businesses operate, while at the same…

FBI Busts Rydox Marketplace
13
Dec
2024

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized

The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”)…

Securing the Hybrid Era: How to Protect Your Expanding Attack Surface
13
Dec
2024

Securing the Hybrid Era: How to Protect Your Expanding Attack Surface – Partner Content

As businesses rapidly adopt hybrid infrastructures, they’re reaping the rewards of flexibility, scalability, and innovation. However, these benefits come at…

CISA Cyber Resiliency Toolkit Update For Public Safety
13
Dec
2024

CISA Cyber Resiliency Toolkit Update For Public Safety

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Public Safety Communications and Cyber Resiliency Toolkit with the release…