Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
Two malware campaigns weaponize open-source software to target executives and cloud systems, combining social engineering with fileless and kernel-level attack techniques.
A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active ...
Linux has long been known as the operating system of developers and power users, but today it’s far more accessible than ever before. Thanks to user-friendly distributions that prioritize simplicity, ...
Linux places no special demands on hardware, so there are generally no limitations when choosing a Linux system. Even more feature-rich desktop distributions like Ubuntu with the Gnome desktop, ...
Kali Linux 2025.2 brings powerful new tools for experienced penetration testers Offensive Security realigns Kali’s interface with MITRE ATT&CK - finally, structure meets hacking function New ...
Thousands of machines running Linux have been infected by a malware strain that’s notable for its stealth, the number of misconfigurations it can exploit, and the breadth of malicious activities it ...
The conversation around gaming on Linux has changed significantly during the last several years. It’s a success story engineered by passionate developers working on the Linux kernel and the ...
A previously undocumented cross-platform malware codenamed Noodle RAT has been put to use by Chinese-speaking threat actors either for espionage or cybercrime for years. Noodle RAT, which also goes by ...
Abstract: Shellcodes are malicious code fragments which are usually executed after exploitation of particular vulnerability. Such shellcodes can be packed within a binary in a form of payload and ...