Blog
Hackers Linked to $14M Holograph Crypto Heist Arrested in Italy
Suspected hackers who stole $14 million worth of cryptocurrency from Holograph, a blockchain tech firm, have been arrested in Italy after living a lavish lifestyle for weeks in luxury villas.
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
Cybercriminals are using popular software searches to spread FakeBat malware, a loader linked to threat actor Eugenfest and identified by Google's threat intelligence team as NUMOZYLOD.
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
Cybercriminals are using popular software searches to spread FakeBat malware, a loader linked to threat actor Eugenfest and identified by Google's threat intelligence team as NUMOZYLOD.
x64dbg: Open-Source Binary Debugger for Windows
x64dbg is an open-source binary debugger for Windows, perfect for malware analysis and reverse engineering executables. It has a user-friendly UI that simplifies navigation and provides context on the process.
Iranian Cyber Group TA453 Targets Jewish Leader with New AnvilEcho Malware
Iranian state-sponsored threat actors have been observed orchestrating spear-phishing campaigns targeting a prominent Jewish figure starting in late July 2024 with the goal of delivering a new intelligence-gathering tool called AnvilEcho. Enterprise security company...
Researchers Uncover TLS Bootstrap Attack on Azure Kubernetes Clusters
Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could allow an attacker to escalate their privileges and access credentials for services used by the cluster. "An attacker with...
Anatomy of an Attack
In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves into the mechanics of a...
Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor
A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an unnamed university in Taiwan. "The most notable feature of this backdoor is that it communicates with a command-and-control (C&C) server via DNS traffic," the...
Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks
Microsoft has classified the issue as low-severity and has not issued any fixes, except for Teams and OneNote apps. Excel, Outlook, PowerPoint, and Word apps remain vulnerable.
Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks
Microsoft has classified the issue as low-severity and has not issued any fixes, except for Teams and OneNote apps. Excel, Outlook, PowerPoint, and Word apps remain vulnerable.
FREE GUIDE