New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

16/04/2025 0 Comments 0 tags

Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong

Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense

16/04/2025 0 Comments 0 tags

Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks

Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users

16/04/2025 0 Comments 0 tags

Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since

U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert

16/04/2025 0 Comments 0 tags

The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented development that could shake up

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

15/04/2025 0 Comments 0 tags

The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known malware dubbed SNOWLIGHT and a new open-source tool called

Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

15/04/2025 0 Comments 0 tags

A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that could allow malicious actors to retain unauthorized access even after a password change.

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

15/04/2025 0 Comments 0 tags

Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI tools. What most IT and security people don’t know is that browser extensions’

Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders

15/04/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that’s designed to reroute trading orders placed on the MEXC cryptocurrency exchange to a malicious

Crypto Developers Targeted by Python Malware Disguised as Coding Challenges

15/04/2025 0 Comments 0 tags

The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a malicious campaign that targets developers to deliver new stealer

Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

15/04/2025 0 Comments 0 tags

A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution, according to Huntress, with seven different organizations compromised to date. Tracked as CVE-2025-30406