-
The Deep Web
Commodified Cybercrime Infrastructure
Cybercriminal takeover The server takeover is the earliest stage, where exposed assets are enumerated (i.e., via network scanners), accessed, and…
-
Mobile
WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to…
-
Mobile
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports…
-
IoT
Lost in Translation
Translation makes it possible to exchange information across the globe, regardless of language differences. Translation plays a similar role in…
-
IoT
The Cybersecurity Blind Spots of Connected Cars
Technology has accelerated the pace in which vehicles provide mobility and convenience. Nowadays, it’s common for connected cars to let…
-
Cloud Security
Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
In this cloud-native world, applications are more assembled than built. Instead of starting from scratch, developers leverage ready-made code components…
-
Cloud Security
Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
When you’re developing a cloud-native web application, it can feel as if you’re building a kingdom. The success of your…
-
Breaches
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft…
-
Breaches
Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, “has…
-
Malware Analysis
IcedID Malware Updates new techniques To Avoid Detection
by Paul Kimayong In our previous blog about IcedID, we explored some of the changes in the malware and how it tries to…