Cybersecurity
-
Threat Intelligence
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An…
-
Threat Intelligence
Name That Toon: Poker Hand
New year, new cartoon contest! We’re flushed with excitement, knowing our clever, cybersecurity-minded readers are going to come up with…
-
Threat Intelligence
New Coalfire Report Reveals CISOs Rising Influence
WESTMINSTER, Colo., Jan. 18, 2023 /PRNewswire/ — In partnership with the world-class Dark Reading research team, global cybersecurity pioneer Coalfire today unveiled its second…
-
Threat Intelligence
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The newly released ChatGPT artificial intelligence bot from OpenAI could be used to usher in a new dangerous wave of…
-
Threat Intelligence
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
Names such as Novelli, orangecake, Pirat-Networks, SubComandanteVPN, and zirochka are unlikely to mean anything to a vast majority of enterprise…
-
Breaches
ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
Ravie LakshmananFeb 12, 2026Cybersecurity / Hacking News Threat activity this week shows one consistent signal — attackers are leaning harder…
-
Breaches
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
Ravie LakshmananFeb 05, 2026Cybersecurity / Hacking News This week didn’t produce one big headline. It produced many small signals —…
-
Malware Analysis
How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
-
Mobile
WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to…
-
Malware Analysis
IcedID Malware Updates new techniques To Avoid Detection
by Paul Kimayong In our previous blog about IcedID, we explored some of the changes in the malware and how it tries to…