-
Cloud Security
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies…
-
Cloud Security
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a…
-
Breaches
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate…
-
Breaches
Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
Mar 27, 2025Ravie LakshmananEndpoint Security / Ransomware A new analysis has uncovered connections between affiliates of RansomHub and other ransomware…
-
Malware Analysis
Rare UEFI Malware Found in the wild Kaspersky says
By Mark Lechtik, Igor Kuznetsov, Yury Parshin Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology…
-
Malware Analysis
How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
-
Threats
UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
Mandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being…
-
Threats
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching…
-
Carding
Google Analytics Used By Cybercriminals to Steal Credit Card Data
Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card…
-
Darkweb
Australian Border Force Seizes Meth Inside a Stuffed Llama
An Australian man was charged in the Perth Magistrate’s Court for attempting to import methamphetamine hidden in a children’s toy.…