New Malware Hides in Bitmap Images of .NET Apps
Cybersecurity experts at Palo Alto Networks’ Unit 42 have discovered a new method attackers use to hide malware inside bitmap images found in harmless-looking 32-bit .NET applications. This clever trick, [...]
Cybercriminals Exploit IT Help Desks as Entry Point for Attacks
Cybercriminals are increasingly pretending to be IT staff or trusted authorities to trick employees into giving them access to sensitive systems, recent cybersecurity reports reveal. These attackers rely on “authority [...]
Cisco Patches Critical SISF Vulnerability Affecting Multiple Products
Cisco has issued critical security updates to address a vulnerability in its Switch Integrated Security Features (SISF), which affects several of its software platforms. The flaw could let attackers on [...]
Agenda Ransomware Adds SmokeLoader & NETXLOADER
The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools like NETXLOADER and SmokeLoader, Trend Micro reports. Agenda Ransomware The Agenda ransomware group, [...]
Wormable Linux Rootkit Steals SSH Keys, Escalates Privileges
Researchers at ANY.RUN have discovered a complex attack using the Diamorphine rootkit to install a crypto miner on Linux systems, showing how open-source tools are being misused in cyberattacks. Their [...]
Get Social