New TCESB Malware Exploits ESET Security Scanner in Active Cyberattacks

New TCESB Malware Exploits ESET Security Scanner in Active Cyberattacks A Chinese-affiliated hacking group, known as ToddyCat, has been caught exploiting a vulnerability in ESET’s security software to deploy a newly discovered malware dubbed TCESB. This sophisticated threat, previously undocumented in ToddyCat’s campaigns, targets organizations across Asia, showcasing the group’s evolving tactics. According to an … Read more

New ‘Rules File Backdoor’ Attack Exploits AI Code Editors to Inject Malicious Code

How hackers can weaponize Code Agents Through Compromised Rule Files

Cybersecurity researchers have uncovered a novel supply chain attack vector known as the “Rules File Backdoor,” targeting artificial intelligence (AI)-powered code editors such as GitHub Copilot and Cursor. This sophisticated technique allows hackers to covertly inject malicious code into software projects by manipulating the AI tools developers rely on daily. The discovery highlights a growing … Read more

How to Become a Penetration Tester: A Comprehensive Guide

Penetration testers, often called “pen testers,” are cybersecurity professionals who simulate cyberattacks on an organization’s computer systems, networks, and applications. These authorized tests uncover security vulnerabilities before malicious hackers can exploit them. As businesses increasingly rely on digital infrastructure, penetration testers play a vital role in protecting sensitive data and ensuring operational security. A career … Read more

Newly Discovered Linux Backdoor “Auto-color” Targets Universities and Government Offices

A sophisticated new Linux backdoor named “Auto-color” has been identified as a significant threat targeting universities and government institutions across North America and Asia, according to cybersecurity experts. In early November 2024, researchers from Palo Alto Networks’ Unit 42 uncovered this elusive malware, noting its ability to evade detection and its resistance to removal without … Read more