Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S.
BRICKSTORM was first documented by the tech giant last year in connection with the zero-day exploitation of Ivanti Connect ...
One of the smartest moves before switching to Linux from Windows is to first test the waters and see for yourself if you like ...
ESET reported that in February it identified four Ukrainian machines compromised by both groups. On those systems, Gamaredon deployed its usual suite of malware families – ...
North Korean hackers target the crypto sector with BeaverTail malware, using fake job offers to steal login credentials and crypto wallets.
REM Proxy’s SystemBC botnet infects 1,500 VPS daily across 80 C2 servers, with 40% unpatched for over 31 days, exposing ...
Mandiant CTO anticipates 'hearing about this campaign for the next one to two years' Unknown intruders – likely China-linked ...
PromptLock hunts down your critical system files, encrypts them, and holds them for ransom. And this is just a test version.
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
IntroductionZscaler ThreatLabz regularly monitors for threats in the popular Python Package Index (PyPI), which contains open source libraries that are frequently used by many Python developers. In ...
An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
Osama Alzoubi, Middle East and Africa VP at Phosphorus Cybersecurity Inc, warns that as cyber threats surge with AI-powered ...