Cybersecurity Blog
Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike
A coordinated law enforcement operation codenamed MORPHEUS has felled close to 600 servers that were used by ...
Twilio’s Authy App Breach Exposes Millions of Phone Numbers
Cloud communications provider Twilio has revealed that unidentified threat actors took advantage of an unauthenticated ...
New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action
A recent report by the Royal United Services Institute (RUSI) emphasized the need for all incident response stakeholders ...
RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now
Microsoft has exposed two significant vulnerabilities in Rockwell Automation’s PanelView Plus devices that could ...
Secator: Open-Source Pentesting Swiss Army Knife
Secator is an open-source task and workflow runner designed for security assessments to streamline the use of various ...
Vulnerabilities in CocoaPods: The Achilles’ Heel of the Apple App Ecosystem
Recent discoveries have unveiled severe vulnerabilities within CocoaPods, a dependency manager essential for iOS and ...
New Ransomware Group Uses Phone Calls to Pressure Victims, Researchers Say
Researchers have identified a new ransomware group called Volcano Demon responsible for two recent successful attacks on ...
Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure
In the early part of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a significant threat ...