Windows infected with backdoored Linux VMs in new phishing attacks
A new phishing campaign dubbed 'CRON#TRAP' infects Windows with a Linux virtual machine that contains a built-in backdoor to give…
A new phishing campaign dubbed 'CRON#TRAP' infects Windows with a Linux virtual machine that contains a built-in backdoor to give…
Much of the open source code embedded in enterprise software stacks comes from small, under-resourced, volunteer-run projects.
Had a Microsoft developer not spotted the malware when he did, the outcome could have been much worse.
In this Tech Tip, we outline how to check if a system is impacted by the newly discovered backdoor in…
Cybercriminals are selling custom Raspberry Pi software called 'GEOBOX' on Telegram, which allows inexperienced hackers to convert the mini-computers into…
Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large…
Kali Linux has released version 2024.1, the first version of 2024, with four new tools, a theme refresh, and desktop…
Kali Linux 2023.4, the fourth and final version of 2023, is now available for download, with fifteen new tools and…
A favorite post-exploitation tool continues to gain sophistication, with one recent example adding disguised log-in pages, credential stealing, and information…
Hackers are targeting Cisco Adaptive Security Appliance (ASA) SSL VPNs in credential stuffing and brute-force attacks that take advantage of lapses…