Cybersecurity Threats | Espionage Techniques | Malware Frameworks Chinese APT group infiltrated Philippine military with EggStreme fileless malware
Backdoor Techniques | Cyber Espionage | Malware MystRodX backdoor uses DNS and ICMP triggers for covert manipulation
Cybercrime Campaign | Information Theft | Malware Distribution Counterfeit PDF editing software downloads TamperedChef malware
Data Privacy | Encryption Policy | Government Surveillance United Kingdom government withdraws Apple backdoor request
Cybersecurity Threats | Malware Framework | Persistent Access Microsoft Analyzes PipeMagic Modular Backdoor
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware
Linux Security Threats | Malware Variants | Remote Access Trojans New FireWood malware targeting Linux systems
Cybersecurity Threats | Open Source Vulnerabilities | Software Supply Chain Risks Investigators have identified XZ Utils backdoor embedded in Docker Hub images
Cyberespionage | Cybersecurity | Vulnerabilities RomCom hackers are utilizing a zero-day vulnerability in WinRAR to conduct specific targeted attacks.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.