News

South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access ...
CISPE's cloud investment is intended to give businesses a Euro choice that is "immune to disruption, access and potential removal by foreign actors.” A major European cloud provider organization ...
"The file contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy, and tunneler." The security issue associated with the deployment of the malware is CVE-2025-0282, a stack-based buffer ...
A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77 . The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to ...
A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. All four flaws are vulnerabilities discovered and ...
KernelSU Next officially supports most Android kernels starting from 4.4 up to 6.6. GKI 2.0 (5.10+) kernels can run pre-built images and LKM/KMI. GKI 1.0 (4.19 - 5.4) kernels need to rebuilt with ...
Wazuh is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity monitoring, policy monitoring, rootkit detection, real-time alerting, active response, ...
North Korean group Lazarus exploited AppLocker driver zero-day CVE-2024-21338 for privilege escalation in attacks involving FudModule rootkit. The notorious North Korean threat group known as Lazarus ...
CandyOpen, developed by SweetLabs, is software designed to be bundled with another program’s installer so that it can be covertly installed onto the computer of every person who uses the ...