APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control OperationsAPT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

3 days ago

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on…

Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!

Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!

3 days ago

IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update 194, packed with security enhancements,…

Threat Actors Leverage DDoS Attacks as Smokescreens for Data TheftThreat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

3 days ago

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have…

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

3 days ago

A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black Lotus Labs, the U.S. Department…

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

3 days ago

A new information-stealing malware dubbed “PupkinStealer” has emerged as a significant threat to individuals and enterprises. Developed in C# using…

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid DetectionPhishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

3 days ago

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential…

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious OperationsVMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

3 days ago

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in VMware Tools, tracked as CVE-2025-22247…

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense ScannerMetasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

4 days ago

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit…

Google Researchers Use Mach IPC to Uncover Sandbox Escape VulnerabilitiesGoogle Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

4 days ago

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

Cybercriminals Hide Undetectable Ransomware Inside JPG ImagesCybercriminals Hide Undetectable Ransomware Inside JPG Images

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

4 days ago

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…