The attack leverages obscure programming languages, mTLS-secured C2, and Windows privilege abuse to achieve persistence and evade detection.
Attackers are shifting from cryptomining to building a multi-vector botnet that can replicate, persist, and prepare for broader attacks.
The update addresses nine critical bugs and two publicly disclosed vulnerabilities in Windows SMB and SQL Server.
The critical bug could let attackers hijack customer accounts without authentication through Adobe Commerce and Magento REST APIs.
The September fixes include a maximum-severity bug that could let attackers execute arbitrary commands via exposed SAP NetWeaver components.
The streaming service confirmed attackers accessed usernames, emails, and hashed passwords, marking the second major breach in three years.
A surge in reconnaissance activity against Cisco ASA devices may foreshadow the disclosure of a new vulnerability, researchers warn.
The attack exploited compromised maintainer accounts to silently inject malicious GitHub Actions workflows into hundreds of repositories.
Hackers infiltrated Lovesac's internal systems for over two weeks, stealing personal data and prompting a RansomHub ransomware extortion attempt.
A new phishing scheme uses legitimate Apple email infrastructure to bypass spam filters and trick victims into calling fake support…
VirusTotal’s AI-enhanced detection revealed an SVG-based phishing campaign that slipped past traditional antivirus tools by disguising malicious portals as official judicial sites.
Attackers used AI prompt engineering to enhance a supply chain attack that compromised thousands of GitHub accounts and repositories through…
Newly discovered npm packages targeting Ethereum developers disguise themselves as trusted cryptographic tools while stealthily exfiltrating private keys and mnemonic…
The powerful new remote access trojan with Python and C variants shows TAG-150's growing sophistication in delivering modular, evasive malware…
A software supply chain compromise exposed sensitive personal data of Wealthsimple clients, though funds and passwords remain secure.
Even minimal project-level permissions can now unlock sensitive repository credentials in unpatched versions of the tool.
Researchers warn that unpatched systems are already being breached as attackers weaponize the flaw against exposed SAP servers.
Attackers are abusing a misconfiguration in outdated Sitecore deployments to gain remote code execution and establish long-term access.
The tire giant says it contained the incident early, but ongoing disruptions raise concerns about supply chain impacts.
The stealthy macro-based backdoor abuses Outlook’s event hooks and email triggers to quietly exfiltrate data and execute commands without raising…
An emerging China-linked threat actor is hijacking legitimate servers worldwide to boost shady websites in search results—and quietly maintain access…
By manipulating metadata fields in promoted videos and leveraging X's own AI chatbot, attackers have found a clever way to…
A new malware campaign blends blockchain and open source deception, using Ethereum smart contracts to stealthily deliver downloader malware through…
Originally built for ethical hacking, HexStrike AI is now being turned into an engine for real-world cyberattacks.
Sign in to your account