Your source for technology insights, tutorials, and guides.
DEEP#DOOR, a Python backdoor, uses a batch script to disable security, then tunnels traffic to steal browser and cloud credentials, evading detection.
Weekly security roundup: fake cell towers for SMS scams busted, critical OpenEMR flaws, 600K Roblox accounts hacked, and 25 other incidents. Learn how to protect yourself.
Threat actors compromised PyTorch Lightning (versions 2.6.2, 2.6.3) and intercom-client to steal credentials via malicious updates on PyPI.
A campaign using sleeper packages in Ruby gems and Go modules exploits CI pipelines for credential theft and GitHub Actions tampering, attributed to BufferZoneCorp.
Two cybersecurity pros sentenced to 4 years for deploying BlackCat ransomware in 2023. DOJ highlights insider threat.
MSPs lose cybersecurity revenue due to five key sales hurdles: technical focus, complex pricing, long cycles, poor ROI articulation, and weak marketing. Overcome them with outcome-based selling, simplified pricing, structured processes, data-driven ROI, and niche marketing to capture the growing $69B market.
Trend Micro uncovers SHADOW-EARTH-053, a China-linked espionage campaign targeting Asian governments, a NATO state, journalists, and activists.
Two cybercrime groups, Cordial and Snarky Spiders, use vishing and SSO abuse for rapid SaaS extortion attacks with minimal traces. Learn their methods and mitigation strategies.
Vietnamese threat group AccountDumpling used Google AppSheet as a phishing relay to steal 30,000 Facebook accounts, which were sold on an illicit storefront. Guardio discovered the campaign.
Trellix confirms unauthorized access to its source code repository, engages forensic experts and law enforcement, but details remain scarce.
Explore the 2010 Flame malware attack that exploited MD5 hash collisions to forge digital certificates, and learn how it foreshadows the quantum computing threat known as Q-Day.
Grinex, a US-sanctioned crypto exchange, halts operations after a $15M heist, blaming western special services for targeting Russian users and threatening Russia's financial sovereignty.
AES-128 remains secure against quantum attacks debunking Grover's algorithm myth due to lack of parallelization.
Microsoft issued emergency patch for ASP.NET Core vulnerability CVE-2026-40372 affecting Linux/macOS. Unauthenticated attackers can gain SYSTEM privileges via forged authentication payloads. Patching alone insufficient; must purge compromised credentials.
Kyber ransomware uses quantum-safe ML-KEM encryption, a marketing move. This Q&A explains the algorithm, why it's unique, and what it means for businesses.
Prestigious university websites are hijacked to serve porn due to unremoved CNAME records. Scammers exploit shoddy housekeeping, affecting at least 34 institutions. Researcher Alex Shakhov discovered the issue.
A popular open source package element-data was hijacked via a workflow vulnerability, stealing credentials from 1M+ users. Learn what happened and how to protect yourself.
Checkmarx and Bitwarden faced supply-chain attacks where hackers compromised Trivy and then Checkmarx's GitHub, stealing credentials and deploying ransomware to security firms.
Ubuntu and Canonical suffered a multi-day DDoS attack by a pro-Iran group using Beam stresser. Mirror sites worked; official services down.
Linux Mint introduces regular HWE ISOs with newer kernels for better hardware support during its longer development cycle until December. Answers cover what HWE ISOs are, why they're needed, who should use them, and how to get them.