Cybersecurity Blog
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical ...
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its ...
Network Threats: A Step-by-Step Attack Demonstration
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how ...
DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest ...
Black Hat SEO Leveraged to Distribute Malware
How It Works The sequence begins with threat actors creating a fake site on a web hosting service, which remains ...
Ring Customers Get $5.6 Million in Privacy Breach Settlement
The FTC is sending $5.6 million in refunds to Ring users whose private video feeds were accessed without consent by ...
Security Explorations – Microsoft Warbird and PMP
In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research ...
ArcaneDoor Hackers Exploit Cisco Zero-Days to Breach Government Networks
The hackers, identified as UAT4356 by Cisco Talos and STORM-1849 by Microsoft, began infiltrating vulnerable edge ...