Security
18 articles
SecurityCisco zero-day exploited in wild
A critical Cisco IOS XE zero-day is under active exploitation, giving attackers full control of vulnerable devices.
SecurityGootBot malware goes fileless to blindside enterprise security
The GootBot malware module enables sophisticated fileless persistence, establishing backdoors in corporate networks through memory-based techniques that evade traditional detection.
SecurityAPT29 Linux backdoor targets data centers in stealth campaign
A new, stealthy Linux backdoor dubbed 'SparrowDoor' has been linked to APT29, posing a critical threat to data center and cloud security. The kernel rootkit evades detection and targets containerized environments.
SecurityBazaCall Live Phish Attack Redefines the Phishing Nightmare
The BazaCall 'Live Phish' attack bypasses traditional email filters using voice calls to initiate sophisticated social engineering schemes in 2024. This hybrid vishing and malware campaign targets the human layer.
SecurityZscaler zero-day exploit shatters zero-trust security model
A massive cyberattack on security giant Zscaler, using a new zero-day exploit, exposes the fragility of the 'never trust, always verify' model under siege.
