Researchers discovered REF4578, an intrusion set that exploits vulnerable drivers to disable EDRs for crypto mining and...
malicious cyber actors
Recently, cybersecurity researchers at Symantec uncovered a fresh Linux backdoor actively targeting users through installation packages. All...
Cacti, a widely used network monitoring tool, has released a critical security update addressing various vulnerabilities, notably...
Dell Technologies recently disclosed a data breach involving a company portal containing limited customer information related to...
Hackers exploit weaponized shortcut files because they can execute malicious code without targeting specific users. Given their...