Threat actors have discovered a way to abuse Google Apps Scripts to sneak links to malicious websites past phishing defenses. According to new research from […]
Author: cyberbytes
APT41 Uses Google Calendar Events for C2
APT41, a Chinese state-sponsored threat actor also known as “Double Dragon,” used Google Calendar as command-and-control infrastructure during a campaign last fall. ​The original article […]
New Botnet Plants Persistent Backdoors in ASUS Routers
Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and […]
Poisoned models in fake Alibaba SDKs show challenges of securing AI supply chains
Developers have been increasingly targeted by attackers in recent years with fake software packages on open-source component repositories — a supply chain attack technique that […]
Zscaler’s Buyout of Red Canary Shows Telemetry’s Value
Red Canary’s MDR portfolio complements Zscaler’s purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data. ​The original article […]
SentinelOne Reports Services Are Back Online After Global Outage
The outage reportedly hit 10 commercial customer consoles for SentinelOne’s Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more. ​The […]
Victoria’s Secret Goes Offline After ‘Incident’ Claims
The lingerie retailer isn’t revealing much about the security incident it’s dealing with but has brought in third-party experts to address the issue. ​The original […]
LexisNexis Informs 360K+ Customers of Third-Party Data Leak
While the leak affected customer data, LexisNexis said in a notification letter that its products and systems were not compromised. ​The original article found on […]
Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack
Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging the legitimate infrastructure of Nifty[.]com, a prominent Japanese Internet Service Provider […]
Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
In a two UK-based universities have fallen victim to a sophisticated Remote Access Trojan (RAT) dubbed NodeSnake within the past two months. According to analysis […]