How to find container-based threats in host-based logs

The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this…

Mobile threat report for Q1 2025

IT threat evolution in Q1 2025. Mobile statisticsIT threat evolution in Q1 2025. Non-mobile statistics Quarterly…

Desktop and IoT threat statistics for Q1 2025

IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics The…

New Mirai botnet campaign targets DVR devices

The abuse of known security flaws to deploy bots on vulnerable systems is a widely recognized…

Librarian Ghouls carry out attacks with data theft and crypto miner deployment

Introduction Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an APT group that targets…

New BrowserVenom malware being distributed via fake DeepSeek phishing website

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels…

Rippling valued at $16.8 billion as HR software startup raises $450 million, says IPO not imminent

From left, Parker Conrad, co-founder and CEO of Rippling, and Kleiner Perkins investor Ilya Fushman speak…

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified…

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly…

Artificial Intelligence – What’s all the fuss?

Overview: AI for Good and Bad# Almost daily now we watch the hallowed milestone of the…