Tag: EN

Linux Malware Authors Attacking Cloud Environments Using ELF Binaries

A sophisticated wave of Linux malware campaigns is targeting cloud environments with increasing frequency and complexity, posing significant threats to modern infrastructure security. The emergence of specialized Executable and Linkable Format (ELF) binaries designed specifically for cloud exploitation represents a…

Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges

A significant security vulnerability in Windows Task Scheduler could allow attackers to escalate their privileges to SYSTEM level access without requiring initial administrative rights.  Designated as CVE-2025-33067, this elevation of privilege vulnerability affects multiple versions of Windows operating systems and…

OffensiveCon25 – KernelGP: Racing Against The Android Kernel

Author/Presenter: Chariton Karamitas Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s events located at the Hilton Berlin; and via the organizations YouTube channel. Thanks and…

Asia dismantles 20,000 malicious domains in infostealer crackdown

Interpol coordinates operation, nabs 32 across Vietnam, Sri Lanka, and Nauru Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against global cybercrime.… This article has been indexed from The…

What is an asymmetric cyberattack?

An asymmetric cyberattack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim’s most vulnerable security measure. This article has been indexed from Search Security Resources and Information from TechTarget…

Securonix Acquires Threat Intelligence Firm ThreatQuotient

Cybersecurity heavyweight Securonix acquires ThreatQuotient to boost plans to build an all-in-one security operations stack. The post Securonix Acquires Threat Intelligence Firm ThreatQuotient appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Securonix Acquires…

Analysis to action: Operationalizing your threat intelligence

Timing is everything in the war against ransomware thieves, says Prelude Security Partner content  When a new security advisory drops or an alarming new ransomware campaign makes the news, the question from leadership inevitably follows: “Are we covered?”… This article…