-
Mar 2, 2023
According to research recently published by cybersecurity firm Trend Micro, Iron Tiger, a Chinese-speaking threat group known for targeting organisations in East Asia, has created a Linux version of its custom malware known as SysUpdate. The malware is designed to… read more »
-
Feb 28, 2023
Blind Eagle, a financially motivated threat actor also known as APT-C-36, has launched attacks targeting organizations in Colombia and Ecuador since at least 2018. According to a recent report by cybersecurity firm CheckPoint, the group employs government-themed lures and sophisticated… read more »
-
Feb 26, 2023
Researchers at Menlo Security have discovered that a threat actor is targeting government agencies in the Asia-Pacific and North American regions with the PureCrypter malware downloader. The campaign has been seen delivering several types of malware, including Redline Stealer, AgentTesla,… read more »
-
Feb 24, 2023
Analysts at cybersecurity firm Sekoia have uncovered a new strain of malware called StealC, an advanced infostealer designed to steal sensitive data from victims. The malware, which is currently being sold on Dark Web forums, is spread through phishing campaigns,… read more »
-
Feb 23, 2023
Brute Ratel (BRc4) is a Command and Control (C2) framework designed to help attackers evade defence systems and remain undetected while executing malicious commands. Used in simulations of real-world attacks, this tool helps red team members deploy badgers on remote… read more »
-
Feb 22, 2023
A recent research by security company ZScaler, reports that threat actors are increasingly using the Havoc Framework for their malicious activities. Havoc is a toolkit that provides attackers with a wide range of capabilities, such as creating malware, exploiting vulnerabilities,… read more »
-
Feb 21, 2023
A new threat actor, dubbed WIP26 by security firm Sentinel One, has recently been identified that is targeting government agencies and telecommunication service providers in the United States. WIP26 is known to use multiple tactics, techniques and procedures (TTPs) to… read more »
-
Feb 20, 2023
Recent research by security firm Symantec has uncovered a new strain of malware called FrebniiS that is specifically designed to target servers running Microsoft Internet Information Services (IIS) software. This malware is designed to steal sensitive data from the servers,… read more »
-
Feb 18, 2023
MLOps, which stands for Machine Learning Operations, is a relatively new field that focuses on the integration of machine learning models into the development and deployment processes of software applications. MLOps can bring significant benefits to organizations, such as improving… read more »
-
Feb 16, 2023
Analysis by MinervaLabs has revealed a new type of malware called BEEP, a highly stealthy malware that can evade detection by most antivirus software. It uses a variety of techniques to hide itself, including encrypting its code and only decrypting… read more »
-
Feb 14, 2023
A new cybersecurity threat for Python developers has been reported, where malicious actors have published over 451 unique Python packages to the official Python Package Index (PyPI) repository. The aim is to infect developer systems with a clipboard-based crypto wallet… read more »
-
Feb 13, 2023
As organizations continue to face increasingly sophisticated cyber threats, the importance of having a robust security operations center (SOC) has become clear. However, for many organizations, the cost of setting up a SOC can be prohibitive, especially for small to… read more »
-
Feb 12, 2023
Sliver is an open source cross-platform adversary emulation/red team framework, developed for penetration testing purposes but, as other similar softwares like Cobalt Strike, is also used by cybercriminals to malicious activities. It is becoming increasingly popular among cybercrime gangs due… read more »
-
Feb 10, 2023
A recent study by researchers at the University of Edinburgh and Trinity College Dublin has revealed that most of top-of-the-range Android devices sold in China are being shipped with spyware. According to the research, a large number of devices are… read more »
-
Feb 8, 2023
A Russian threat group, dubbed TA866 by Proofpoint, is suspected of using a new technique to steal sensitive information. The group has been taking screenshots of infected devices and uploading them to a remote server. The use of screenshots is… read more »
-
Feb 7, 2023
The first Linux version of the Clop ransomware has been discovered, with a flaw in its encryption algorithm that allows it to be decrypted without paying the ransom. Cybersecurity firm SentinelOne discovered the ELF version on 26 December 2022, and… read more »
-
Feb 6, 2023
Several e-commerce industries in South Korea and the United States are being targeted by a GuLoader malware campaign, according to a report from cybersecurity firm Trellix. The attack is notable for its transition from using malware-laden Microsoft Word documents to… read more »
-
Feb 3, 2023
I have released my new musical work, Komorebi: a 4-track album that explores the world of electronic, lo-fi music, with each track designed to create a relaxing and peaceful atmosphere. The title of the album, Komorebi, is a Japanese word… read more »
-
Feb 2, 2023
Kaspersky Lab cybersecurity experts have discovered a new version of the Prilex point-of-sale (PoS) malware that has been enhanced to target transactions using NFC technology and is believed to be the most advanced PoS threat to date. The Prilex malware… read more »
-
Feb 1, 2023
The National Institute of Standards and Technology (NIST) has released the Artificial Intelligence Risk Management Framework (AI RMF 1.0) which provides guidelines for organizations to manage risks and promote responsible use of AI systems. The framework outlines the characteristics of… read more »