In recent months, a surge in the use of Windows Packet Divert (WinDivert) drivers has been observed, primarily to intercept and modify network traffic on Windows systems. These drivers, widely used in legitimate utilities to bypass internet restrictions, have become an attractive tool for cybercriminals. Over the past six months, over 2.4 million detections of…
WASHINGTON, March 5 (Reuters) – A U.S. congressional committee is warning Americans to replace Chinese-made wireless routers, including those manufactured by TP-Link, citing national security concerns. Lawmakers argue that these devices pose a cyber threat that could allow China to infiltrate U.S. critical infrastructure. The House Select Committee on the Chinese Communist Party has urged…
Cybercriminals continue to evolve their tactics, leveraging legitimate platforms to distribute malicious payloads. Microsoft Threat Intelligence has uncovered a large-scale malvertising campaign that infected nearly one million devices globally through deceptive ads embedded in illegal streaming websites. These ads redirected users through a multi-stage attack chain, ultimately leading to malicious repositories hosted on GitHub, Discord,…
As we soar through 2025, Kali Linux 2024.4 is with us for its final release of the year, bringing some major changes to the world’s favorite penetration testing and cybersecurity-focused Linux distribution. This update introduces Python 3.12, the end of i386 images, Raspberry Pi Imager customizations, GNOME 47, a refreshed Kali Forums, Kali NetHunter updates,…
How China’s Cyber Mercenaries Are Reshaping Global Security In a major legal breakthrough, the U.S. Department of Justice (DOJ) and FBI have unsealed indictments against 12 Chinese nationals linked to a state-sponsored cyber espionage network. These individuals—including members of the notorious APT27 hacking group—are accused of hacking government agencies, corporations, and dissidents worldwide under the…
The term “hacker” often conjures images of cybercriminals exploiting vulnerabilities for malicious purposes. However, many individuals, known as ethical hackers, penetration testers, and security researchers, dedicate their skills to safeguarding systems by identifying and addressing vulnerabilities before they can be exploited by malicious actors. Yet, the realm of ethical hacking is fraught with complexities. Even…