Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell.
The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up.
“The payload isn’t hidden inside the file content or a macro, it’s encoded directly

The Hacker News – ​Read More

95% of business applications of AI have failed. Here’s why

Here’s what the other 5% is getting right.

Latest news – ​Read More

In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M

Noteworthy stories that might have slipped under the radar: cryptojacker sentenced to prison, ECC.fail Rowhammer attack, and Microsoft limits China’s access to MAPP.

The post In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M appeared first on SecurityWeek.

SecurityWeek – ​Read More

Your Google Home setup is getting its long-awaited Gemini upgrade soon – what to expect

Gemini for Home is poised to take over from Google Assistant – and that’s a big deal. Here’s why it matters.

Latest news – ​Read More

Should you buy a $120 Android tablet from Amazon? I tried one, and here’s what you actually get

For around $125, the Tabwee T80 is not as bad as I was expecting.

Latest news – ​Read More

Do Claude Code Security Reviews Pass the Vibe Check?

AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding.

darkreading – ​Read More

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims.
“The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said.
The effort is the second phase of an ongoing law

The Hacker News – ​Read More

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks.
“The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial access to their targets by

The Hacker News – ​Read More

How I’m bringing back physical media – and the 5 home theater gadgets helping me do it

I found the best tech for creating a home theater that can handle everything from vinyls to cloud gaming, as well as some storage options to keep it all organized.

Latest news – ​Read More

Automation Is Redefining Pentest Delivery

Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace.
Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays,

The Hacker News – ​Read More