Cyber security news for all

More

    Malware & Threats

    New BPFDoor Malware Controller Facilitates Hidden Lateral Movement on Linux Systems

    A newly discovered controller linked to the BPFDoor backdoor is enabling stealthy lateral movement across Linux servers, as part of a wave of cyberattacks...

    New Golang Malware Leverages Telegram Bot API for Stealthy Command-and-Control

    A newly discovered backdoor malware, developed using the Go programming language, has been observed utilizing the Telegram Bot API to conduct covert command-and-control (C2)...

    New SparrowDoor Backdoor Variants Target U.S. and Mexican Entities in Advanced Cyber Campaign

    A previously observed Chinese cyber espionage group, known as FamousSparrow, has been linked to recent intrusions targeting a trade association in the United States...

    Phishing Attacks Now Validate Victim Emails in Real-Time to Maximize Credential Theft

    A new phishing method is emerging that uses real-time email validation to ensure only legitimate, high-value targets are exposed to credential theft attempts. Dubbed precision-validating...

    159 Vulnerabilities Exploited in Q1 2025, with Nearly 30% Targeted Within 24 Hours

    In the first quarter of 2025, a total of 159 Common Vulnerabilities and Exposures (CVEs) were reported as actively exploited, showing an increase from...

    Linux Rootkit Exploits io_uring to Evade System Call Monitoring in Security Tools

    A newly developed proof-of-concept (PoC) rootkit has exposed a significant blind spot in many Linux runtime security solutions by utilizing the io_uring interface to...

    Recent Articles