3 Min Read LineasDNSon05/03/2025China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access The China-linked threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its…
6 Min Read LineasDNSon05/03/2025Defending against USB drive attacks with Wazuh USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and…
3 Min Read LineasDNSon05/03/2025Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks…
2 Min Read LineasDNSon05/03/2025Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their…
3 Min Read LineasDNSon05/03/2025Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the…
4 Min Read LineasDNSon05/03/2025Identity: The New Cybersecurity Battleground The rapid adoption of cloud services, SaaS applications, and the shift to remote work have fundamentally reshaped how enterprises operate.…
2 Min Read LineasDNSon05/03/2025Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed…
3 Min Read LineasDNSon04/03/2025Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for…
2 Min Read LineasDNSon04/03/2025VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products…
7 Min Read LineasDNSon04/03/2025How New AI Agents Will Transform Credential Stuffing Attacks Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of infostealer infections and data breaches. But things…