Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers, and it's even been adapted by hackers for Linux environments.
And now it's i...
Hackers have been exploiting macros in Microsoft Office products for years, but now their tactics are changing as Microsoft has begun blocking macros by default.
The typical attack scenario involv...
Linux malware is skyrocketing and now surpasses both macOS and Android, according to a new report, suggesting that cybercriminals are increasingly targeting the open source operating system.
The A...
Discovered by malware hunter JAMESWT on Twitter, Lilith is ransomware designed to lock Windows machines. The malware exfiltrates data before encrypting the targeted devices to provide additional mean...
The first signs of the ransomware attack at data storage vendor Spectra Logic were reports from a number of IT staffers about little things going wrong at the beginning of the day. Matters steadily w...
Intezer Labs security researchers have identified a sophisticated new malware that targets Linux devices. Dubbed OrBit, the malware can gain persistence quickly, evade detection and hide its presence...
MITRE has released its latest list of the top 25 most exploited vulnerabilities and exposures found in software.
The MITRE CWE list is different from the product-specific CVE lists from the U.S. C...
Security researchers have uncovered an unusually sophisticated malware that has been targeting small office/home office (SOHO) routers for nearly two years, taking advantage of the pandemic and rapi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that government agencies and private organizations that use Microsoft's Exchange cloud email platform migrate users an...
Cybersecurity researchers have found more than 900,000 instances of Kubernetes consoles exposed on the internet.
Cyble researchers detected misconfigured Kubernetes instances that could expose hun...