Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

06/03/2025 4 Comments 0 tags

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. “Creating four backdoors facilitates the attackers having multiple points of re-entry

Outsmarting Cyber Threats with Attack Graphs

06/03/2025 0 Comments 0 tags

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead,

U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations

06/03/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their alleged participation in a wide-ranging scheme designed to steal data and suppress free speech and

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

05/03/2025 0 Comments 0 tags

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

05/03/2025 0 Comments 0 tags

Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. “These features specifically target conversational scams, which can often

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

05/03/2025 0 Comments 0 tags

The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America

Defending against USB drive attacks with Wazuh

05/03/2025 0 Comments 0 tags

USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to

Identity: The New Cybersecurity Battleground

05/03/2025 0 Comments 0 tags

The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate. These technological advances have created a world of opportunity but

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

05/03/2025 0 Comments 0 tags

The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated versions of a

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

05/03/2025 0 Comments 0 tags

Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. “The