Content Paint

malware

“Sleeper cells” in telcos seen using novel new BPFdoor malware

"Kernel-level packet filtering to bypass multiple layers of modern network defenses"

Advanced Linux VoidLink malware package surfaces - targets cloud, containers

There looks to be a large group working on the project who have “big, big dreams, big goals, and they are iterating very fast,

Insurer pulls back from "unprofitable" US cyber market

Rates for cyber insurance keep falling even in a "very active claims environment"

Tech firms exploited, urged to threat-hunt for deeply persistent “BRICKSTORM” malware

Stealthy attacker gaining dwell time of over a year on average.

What is CISA’s newly open-sourced Thorium?

"Users can define a series of modular steps—such as static file analysis, dynamic sandboxing, hash verification, unpacking, or signature detection"

"Absurd" 12-step malware dropper spotted in malicious npm packages

Supply chain attack effort used steganography, a "dizzying wall of Unicode characters" and more.

Authorities claim to have broken key links in the ‘ransomware kill chain’…for now at least

Cybercrim whack-a-mole as Operation Endgame continues

A rat pokes its head through a cardboard box. the SpyNote malware is described as an AndroidOS RAT

China nexus group suspected as the attackers behind attacks

CISA uncovers more Ivanti ICS  targeting malware…dub it RESURGE

It’s the end of March 2025...of course CISOs still need to worry about Ivanti Connect Secure flaws.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.