Sitemap
Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Australian Man Sentenced for Selling Ecstasy on the Darkweb
- Brave Browser Leaked DNS Queries for Onion Services
- Australian Border Force Seizes Meth Inside a Stuffed Llama
- New Change to German Postal Law Targets Internet Drug Trade
- Dream Market Vendor “Rackjaw2” Sentenced to Prison
- Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
- Category: Fraud
- Category: The Deep Web
- Category: Hackers
- Category: Breaches
- SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
- Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices
- Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
- Webinar: Learn How to Unite Dev, Sec, and Ops Teams With One Shared Playbook
- ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
- Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
- Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
- Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them
- Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec
- INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
- Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025
- From Impact to Action: Turning BIA Insights Into Resilient Recovery
- Simple Steps for Attack Surface Reduction
- Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
- New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
- GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions
- SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
- Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
- Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure
- FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
- CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation
- How the Browser Became the Main Cyber Battleground
- CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
- Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
- The Unusual Suspect: Git Repos
- Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
- Category: Phishing
- Category: Breaches
- Category: Malware
- Category: Malware Analysis
- Chinese government hackers attack Russian companies for the first time
- Rare UEFI Malware Found in the wild Kaspersky says
- How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
- IcedID Malware Updates new techniques To Avoid Detection
- New Info Stealer Poulight From The Russian Underground
- Category: Threats
- Forced Chrome extensions get removed, keep reappearing
- ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
- Credential-stealing malware disguises itself as Telegram, targets social media users
- Don’t let scammers ruin your Valentine’s Day
- SolarWinds attackers launch new campaign
- Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
- The UNC2529 Triple Double: A Trifecta Phishing Campaign
- UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
- Abusing Replication: Stealing AD FS Secrets Over the Network
- Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
- Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
- Category: Malware Analysis
- Category: Security
- Category: Cloud Security
- Crawl, Walk, Run: Operationalizing Your IaC Security Program
- How To Prevent the IaC Misconfiguration Snowball Effect
- Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
- You Must Comply! Why You Need Proactive Open-Source License Compliance
- Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
- Prisma Cloud Provides New Extensive Use Cases for Azure Customers
- 6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
- 9 Essential Infrastructure Security Considerations for Kubernetes
- Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
- Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
- Building the Business Case for DevSecOps
- What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
- Category: IoT
- A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
- The Transition to 5G: Security Implications of Campus Networks
- Lost in Translation
- The Cybersecurity Blind Spots of Connected Cars
- New P2P Botnet Targeting IoT Devices
- IoT Security, Attacks And The Industrial Systems at Risk
- Category: Mobile
- Google removes 16 malicious apps from play store found to be part of the Joker malware family
- WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
- Vulnerabilities in old GTP protocol could affect 4G and 5G networks
- Google is indexing the phone numbers of WhatsApp Users
- Chinese authorities monitor content of WeChat users registered outside China
- Category: Threat Intelligence
- Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
- Hunting Insider Threats on the Dark Web
- FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
- Ransomware Profits Decline as Victims Dig In, Refuse to Pay
- Attackers Crafted Custom Malware for Fortinet Zero-Day
- Cybercriminals Target Telecom Provider Networks
- Name That Toon: Poker Hand
- New Coalfire Report Reveals CISOs Rising Influence
- ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
- Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
- Microsoft to Block Excel Add-ins to Stop Office Exploits
- ‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
- Category: Web Applications
- Category: Cloud Security