More

    Exploits

    Hackers Exploiting WordPress Websites With Silent Malware to Gain Admin Access

    A sophisticated malware campaign targeting WordPress websites has been discovered employing advanced steganographic techniques and persistent backdoor mechanisms to maintain unauthorized administrator access. The...

    A China-Linked Malware Group Is Targeting Software Suppliers

    Key takeaways Google detected a long-term malware operation by the China-linked UNC5221 group. The group’s malware stayed undetected in victims’ systems for an average of 393...

    Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs

    Microsoft Threat Intelligence reports that a new variant of the XCSSET macOS malware has been detected in limited attacks, incorporating several new features, including...

    Lazarus RAT code resurfaces in North Korean IT-worker scams

    North Korean-linked crews connected to the pervasive IT worker scams have upped their malware game, using more advanced tools, including a backdoor that has...

    Cybersecurity centre warns of ‘sophisticated’ threat targeting Cisco equipment

    Skip to main content Sci-Tech By The Canadian Press Video Video Video Video Video Video Video Video Video Video Video Video Video Video Politics Business Health Entertainment Sports Lifestyle Climate & Environment Sci-Tech Photos  

    Under the radar – Google warns new Brickstorm malware was stealing data from US firms for over a year

    (Image credit: Shutterstock) Google warns UNC5221 targeted US legal, tech, and SaaS firms with Brickstorm malware for over a year Campaign aimed at espionage, intellectual property...

    Experts warn Supermicro motherboards can be infected with “unremovable” new malware – here’s what we know

    (Image credit: Shutterstock) Binarly finds new Supermicro BMC flaws enabling persistent, unremovable malware installation Attackers can bypass previous patches and exploit firmware validation logic inconsistencies Researchers recommend...

    New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware

    New LNK malware uses trusted Windows binaries to bypass defenses, spread via phishing & sites, stealthily fetching hidden payloads. 

    NCSC warns of persistent malware campaign targeting Cisco devices

    Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices. 

    Latest articles