Elite cybercriminals prefer LotL attacks because they’re incredibly hard to spot. Instead of deploying obvious malware, attackers use the same trusted tools that an IT […]
Category: Cyber Security News
Hybrid Exchange environment vulnerability needs fast action
Administrators with hybrid Exchange Server environments are urged by Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) to quickly plug a high-severity vulnerability […]
HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely adopted open-source secrets management platform, enabling attackers to bypass authentication, […]
‘Samourai’ Cryptomixer Founders Plead Guilty to Money Laundering
As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million. ​The original article found on darkreading Read […]
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS to filter and redirect […]
Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials remain the primary vector for initial access in more than […]
Citizen Lab Founder Flags Rise of US Authoritarianism
Citizen Lab director and founder Ron Deibert explained how civil society is locked in “vicious cycle,” and human rights are being abused as a result, […]
Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses in the quickly developing field of cybersecurity. Unlike raster formats […]
Payback: ‘ShinyHunters’ Clocks Google via Salesforce
In 2024, it was Snowflake. In 2025, it’s Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, […]
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year’s Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees. ​The original […]