Cybersecurity Blog
One More Tool Will Do It? Reflecting on the CrowdStrike Fallout
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by ...
Sextortion Scam Now Use Your “Cheating” Spouse’s Name as a Lure
A new sextortion scam variant is targeting spouses by claiming their partner is cheating on them and providing alleged ...
Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT
The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a ...
Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks
The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual ...
HAProxy Vulnerability CVE-2024-45506 Under Active Exploit: Urgent Patching Required
This flaw in the HTTP/2 multiplexer can lead to an endless loop, system crashes, and remote denial-of-service attacks, ...
Critical GeoServer Flaw Enabling Global Hack Campaigns
The flaw in GeoServer, tracked as CVE-2024-36401 and with a CVSS score of 9.8, was swiftly capitalized on by hackers who ...
Webinar: How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits
GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. ...
LummaC2 Stealer and Malicious Chrome Extension Wreak Havoc
This attack begins with victims unknowingly downloading a malicious ZIP archive containing an installer file that ...