Category: Security

EDRSilencer 0

EDRSilencer: The Silent Killer of Endpoint Security

Trend Micro specialists have discovered that in a series of attacks, cybercriminals utilized the EDRSilencer tool to disable EDR system alerts. Attackers integrate this tool into their operations to conceal traces of their activities...

Command Jacking 0

Command Jacking: The New Supply Chain Attack Vector

Researchers at Checkmarx have identified a new technique for supply chain attacks in open-source ecosystems, enabling malicious actors to exploit command-line interface (CLI) manipulations for the covert injection of malicious code. Such attacks are...

NSA Backdoors 0

Intel Accused of Embedding NSA Backdoors in Processors

The Chinese Cybersecurity Association (CSAC) has leveled serious accusations against Intel Corporation. In an extensive statement published on WeChat, the organization detailed numerous vulnerabilities in the American manufacturer’s processors and harshly criticized its approach...