DPRK’s APT37 Targets Cambodia With Khmer, ‘VeilShell’ Backdoor
It’s North Korea versus Cambodia, with Windows default settings and sheer patience allowing the bad guys to avoid easy detection.…
Thousands of DrayTek Routers at Risk From 14 Vulnerabilities
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other…
Ukraine-Russia Cyber Battles Tip Over Into the Real World
“Pig butchering,” generative AI, and spear-phishing have all transformed digital warfare. “Pig butchering,” generative AI, and spear-phishing have all transformed…
CISA Adds High-Severity Ivanti Vulnerability to KEV Catalog
Ivanti reports that the bug is being actively exploited in the wild for select customers. Ivanti reports that the bug…
Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks
Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising…
The Future of AI Safety: California’s Vetoed Bill & What Comes Next
Although the veto was a setback, it highlights key debates in the emerging field of AI governance and the potential…
The Secret Weakness Execs Are Overlooking: Non-Human Identities
For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the…
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim…