Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

24/04/2025 0 Comments 0 tags

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a “major blind

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

24/04/2025 0 Comments 0 tags

At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

24/04/2025 0 Comments 0 tags

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. “This addition lowers the technical barrier for

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

24/04/2025 0 Comments 0 tags

A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score

Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

24/04/2025 0 Comments 0 tags

The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an

WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

24/04/2025 0 Comments 0 tags

WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups.

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

23/04/2025 0 Comments 0 tags

Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

23/04/2025 0 Comments 0 tags

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024.

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

23/04/2025 0 Comments 0 tags

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

23/04/2025 0 Comments 0 tags

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before.