Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38,…
Linux
-
-
Physical SecuritySecurity
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring.…
-
The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has…
-
It’s easy to think your defenses are solid — until you realize attackers have…
-
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered…
-
Oct 16, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed details of a new…
-
Oct 16, 2025Ravie LakshmananVulnerability / Malware An investigation into the compromise of an Amazon…
-
Oct 16, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed details of a new…
-
Data BreachSecurity
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
-
Spectre And Meltdown Vulnerability Checker For Linux Meltdown and Spectre exploit critical vulnerabilities in…
