Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
Aug 14, 2025Ravie LakshmananThreat Intelligence / Linux Japan's CERT coordination center (JPCERT/CC)…
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have disclosed vulnerabilities…
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
Aug 02, 2025Ravie LakshmananThreat Detection / SSH Security Cybersecurity researchers have flagged…
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat…
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324…
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
Jul 25, 2025Ravie LakshmananMalware / Cloud Security Threat hunters have disclosed two…
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
Jul 23, 2025Ravie LakshmananMalware / Cryptocurrency The threat actor behind the exploitation…
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
Jul 10, 2025Ravie LakshmananVulnerability / AI Security Cybersecurity researchers have discovered a…
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security…


