Cybersecurity Blog
LockBit Ransomware Returns to Attacks With New Encryptors, Servers
LockBit has set up new data leak and negotiation sites, and is actively recruiting experienced pentesters to join their ...
Examining Malicious Hugging Face ML Models with Silent Backdoor
In the realm of AI collaboration, Hugging Face reigns supreme. But could it be the target of model-based attacks? Recent ...
New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems
Feb 29, 2024NewsroomThreat Intelligence / Cyber Threat Cybersecurity researchers have disclosed a new attack technique ...
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
Feb 29, 2024NewsroomLinux / Network Security Threat hunters have discovered a new Linux malware called GTPDOOR ...
Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks
Feb 29, 2024NewsroomRootkit / Threat Intelligence The notorious Lazarus Group actors exploited a recently patched ...
How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI
Feb 29, 2024The Hacker NewsAttack Surface / Incident Response As an IT leader, staying on top of the latest ...
New Backdoor Targeting European Officials Linked to Indian Diplomatic Events
Feb 29, 2024NewsroomCyber Espionage / Malware A previously undocumented threat actor dubbed SPIKEDWINE has been ...
Lazarus Exploits Typos to Sneak PyPI Malware into Dev Systems
Feb 29, 2024NewsroomMalware / Endpoint Security The notorious North Korean state-backed hacking group Lazarus uploaded ...