Intel

Recent findings have highlighted a significant cybersecurity threat to some of the most sensitive networks in the United States. Researchers have uncovered extensive credential theft facilitated by infostealer malware, potentially compromising critical corporate and military systems. Widespread Credential Theft Analysis by cybersecurity experts has revealed that cybercrime marketplaces are selling

Recent cyberattacks have highlighted a vulnerability in Signal's device linking feature, allowing hackers to gain unauthorized access to user accounts. These attacks, primarily attributed to Russian-aligned threat actors, exploit the app's legitimate functionality to eavesdrop on communications. Exploitation of Signal's Device Linking The attacks

A severe vulnerability has been discovered in the Jupiter X Core WordPress plugin, potentially affecting over 90,000 websites. This flaw, identified by cybersecurity experts, allows attackers with certain user privileges to upload harmful SVG files, leading to remote code execution on compromised servers. Details of the Vulnerability The vulnerability,

Recent discoveries have highlighted significant security vulnerabilities in Xerox Versalink printers, potentially allowing cybercriminals to steal sensitive credentials. These issues, identified by Rapid7, involve LDAP and SMB flaws, specifically affecting firmware version 57.69.91 and earlier. It is crucial for organizations using these devices to update their firmware immediately

A critical vulnerability in Palo Alto Networks' PAN-OS software is currently being exploited by cybercriminals. This flaw, identified as CVE-2025-0108, allows attackers to bypass authentication and execute certain PHP scripts, posing a significant threat to affected systems. Understanding the Vulnerability The flaw, first reported by researchers at Searchlight Cyber

North Korea-affiliated cyber threat groups are increasingly adopting living-off-the-land (LotL) strategies and utilizing trusted services to bypass detection. A recent campaign by the Kimsuky group exemplifies this approach by employing PowerShell scripts and storing data in Dropbox folders, all while enhancing their operational security measures. DEEP#DRIVE Campaign Tactics The

Recently, two significant vulnerabilities have been identified in OpenSSH, a crucial tool for secure remote operations. These flaws, discovered by the Qualys Threat Research Unit (TRU), pose risks of machine-in-the-middle (MITM) and denial-of-service (DoS) attacks. Users are urged to upgrade to OpenSSH version 9.9p2 to safeguard their systems. OpenSSH

A sophisticated cyber campaign, dubbed RevivalStone, has been attributed to the China-affiliated threat actor known as Winnti. This campaign specifically targets Japanese companies in the manufacturing, materials, and energy sectors. Winnti, active since at least 2012, has recently shifted its focus towards Asian manufacturing and materials organizations. Winnti's

A newly identified Golang backdoor utilizes Telegram for command and control (C2) operations. This malware, discovered by cybersecurity experts at Netskope, exploits Telegram's API for malicious activities. This article explores the mechanics of this threat and offers guidance on safeguarding against it. Understanding the Golang Backdoor The malware,