Cybersecurity Blog
Malvertising Campaign Lures Mac Users with Fake Microsoft Teams Ad
The malicious ad campaign employed advanced filtering techniques to evade detection and appeared as a top search result ...
CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
The US Cybersecurity and Infrastructure Security Agency (CISA) conducted a red team exercise at an unnamed federal ...
GitHub Token Leak Exposes Python’s Core Repositories to Potential Attacks
Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated ...
Zeus Banking Malware Player Gets Nine-Year Prison Term
Vyacheslav Igorevich Penchukov, a criminal who used Zeus and IcedID malware to steal millions of dollars from victims, ...
Netgear Warns Users to Patch Auth Bypass, XSS Router Flaws
Netgear released firmware patches to fix stored XSS and authentication bypass flaws in the XR1000 Nighthawk gaming ...
10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit
Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t ...
Google Reportedly in Talks to Acquire Cloud Security Company Wiz for $23B
Alphabet, Google’s parent company, is in advanced talks to acquire cloud security provider Wiz for around $23 ...
CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool
A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their ...