Ciphers Security – Cybersecurity, OSINT, DFIR & Ethical Hacking Library

Latest News

Quasar Linux (QLNX): Rootkit and PAM Backdoor Targeting Developer Credentials

Trend Micro discovered QLNX, a stealthy Linux RAT with LD_PRELOAD rootkit, kernel eBPF component, and.

Read More

Taiwan High-Speed Rail TETRA Hack Halts Four Trains Using Cheap SDR

A student used a $30 SDR to spoof TETRA emergency signals and halt four Taiwan.

Read More

DAEMON Tools Supply Chain Attack: Official Installers Backdoored by Suspected Chinese

Kaspersky found DAEMON Tools versions 12.5.0.2421–12.5.0.2434 compromised with a signed backdoor and QUIC RAT since.

Read More

FTC Bans Kochava from Selling Location Data Without Consent in Settlement

The FTC has banned data broker Kochava and subsidiary CDS from selling precise location data.

Read More

Latvian Conti/Karakurt Ransomware Negotiator Deniss Zolotarjovs Sentenced to 102 Months in

Deniss Zolotarjovs, 35, sentenced to 102 months for his role in the Conti/Karakurt/Akira ransomware ecosystem.

Read More

NHS England Orders GitHub Repos Private Over AI Vulnerability Analysis Fears

NHS England is close-sourcing hundreds of GitHub repositories by May 11, citing Anthropic Mythos AI's.

Read More

Microsoft Edge Loads All Saved Passwords into Cleartext Memory at Launch

A researcher found Microsoft Edge decrypts every saved password into process memory at startup and.

Read More

WhatsApp Patches CVE-2026-23863 File Spoofing and CVE-2026-23866 URL Scheme Flaw

Meta patches two WhatsApp vulnerabilities: CVE-2026-23863 (file spoofing via NUL byte, CVSS 6.5) on Windows.

Read More

1 Million Exposed AI Services Scanned: LLM Security Is Worse Than

Researchers scanned 1 million exposed AI services in 2026 and found rampant misconfigurations: 31% of.

Read More

HOT CATEGORIES

MOST VIEWS POST

Blog

EDR Vendor Breach Downstream Risk: Responding When Your Security Tool Is

Trellix confirmed a source code breach. Assess EDR vendor breach downstream risk, audit agent update.

Read More

Fast16 Malware Reverse-Engineering: State-Sponsored Computation Sabotage Analysis

Fast16 malware reverse-engineered: a 2005 US-attributed tool that silently corrupted scientific computation in Iran, predating.

Read More

CVE-2024-57727 SimpleHelp RMM: Patch Verification and Detection Checklist

CVE-2024-57727 in SimpleHelp RMM (CVSS 7.5) lets unauthenticated attackers read any file. Step-by-step detection, patch.

Read More