Cybersecurity Blog
Kubernetes Exposed: Exploiting the Kubelet API
Real-world attacks have been observed where attackers target the Kubelet API to steal secrets and gain control over ...
Beware of BadPack: One Weird Trick Being Used Against Android Devices
BadPack is an APK file intentionally packaged in a malicious way. In most cases, this means an attacker has maliciously ...
Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks
The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin ...
Critical Apache HugeGraph Vulnerability Under Attack – Patch ASAP
Threat actors are actively exploiting a recently disclosed critical security flaw impacting Apache HugeGraph-Server that ...
HR-Themed Phishing Campaign Targets Employees to Steal Microsoft Credentials
In a recent phishing attempt, Cofense researchers spotted an email disguised as a communication from a company’s ...
Facebook Ads for Windows Desktop Themes Push Info-Stealing Malware
The threat actors take out ads for Windows themes, free game downloads, and software cracks for apps like Photoshop and ...
Void Banshee Targets Windows Users Through MSHTML Flaw to Spread Atlantida Stealer
The vulnerability, CVE-2024-38112, was observed by Trend Micro in May 2024, being exploited as part of a multi-stage ...
SEXi Ransomware Rebrands as ‘APT Inc.,’ Retains Prior Extortion Tactics
The cybercrime group known as SEXi ransomware, now operating as APT Inc., has been targeting organizations since ...