Using an agent for the Mythic framework: pros and cons in pentesting

Introduction The way threat actors use post-exploitation frameworks in their attacks is a topic we frequently…

Kaspersky industrial threat report for Q1 2025

Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects…

Dero miner spreads inside containerized Linux environments

Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an…

Rippling valued at $16.8 billion as HR software startup raises $450 million, says IPO not imminent

From left, Parker Conrad, co-founder and CEO of Rippling, and Kleiner Perkins investor Ilya Fushman speak…

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified…

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly…

Artificial Intelligence – What’s all the fuss?

Overview: AI for Good and Bad# Almost daily now we watch the hallowed milestone of the…

Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion

Silicon Valley data security startup Cyberhaven has bagged a hefty $100 million in new financing that…

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

Artificial intelligence is a double-edged sword. On one side, AI empowers people to do their jobs better…

New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones…