Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring.
This causes a “major blind spot in Linux runtime … Continue reading Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Posted in Uncategorized

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities.
“This addition lowers the technical barrier for creating phish… Continue reading Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Posted in Uncategorized

Skyhawk Security brings preemptive cloud app defense to RSAC 2025

Skyhawk Security is adding new protection for custom-built cloud applications. The company announced the update to its AI-powered Autonomous Purple Team for RSAC 2025 Conference, which starts April 28 in San Francisco. The AI-based purple team identifi… Continue reading Skyhawk Security brings preemptive cloud app defense to RSAC 2025

HHS Office for Civil Rights Settles Phishing Attack Breach with Health Care Network for $600,000

Today, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a settlement with PIH Health, Inc. (PIH), a California health care network, over potential violations of the Health Insurance Portability and Account… Continue reading HHS Office for Civil Rights Settles Phishing Attack Breach with Health Care Network for $600,000