Introduction The way threat actors use post-exploitation frameworks in their attacks is a topic we frequently…
Category: News
Kaspersky industrial threat report for Q1 2025
Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects…
Dero miner spreads inside containerized Linux environments
Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an…
Rippling valued at $16.8 billion as HR software startup raises $450 million, says IPO not imminent
From left, Parker Conrad, co-founder and CEO of Rippling, and Kleiner Perkins investor Ilya Fushman speak…
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified…
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly…
Artificial Intelligence – What’s all the fuss?
Overview: AI for Good and Bad# Almost daily now we watch the hallowed milestone of the…
Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion
Silicon Valley data security startup Cyberhaven has bagged a hefty $100 million in new financing that…
AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor
Artificial intelligence is a double-edged sword. On one side, AI empowers people to do their jobs better…
New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks
A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones…