Google has now confirmed that it too was impacted by the Salesforce data theft attacks originally uncovered by its own threat intelligence group (GTIG) in […]
Project Ire: Microsoft’s autonomous AI agent that can reverse engineer malware
Microsoft has introduced Project Ire, an autonomous AI agent capable of analyzing and classifying software as either malicious or benign, without any prior knowledge of […]
Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses
Threat actors have been deploying a novel antivirus (AV) killer since at least October 2024, leveraging the legitimate ThrottleStop.sys driver to execute Bring Your Own […]
Akamai Ghost Platform Flaw Allows Hidden Second Request Injection
Akamai Technologies disclosed a critical HTTP request smuggling vulnerability affecting its content delivery network platform that could allow attackers to inject hidden secondary requests through […]
New Active Directory Attack Method Bypasses Authentication to Steal Data
Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments to bypass authentication and exfiltrate […]
HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR
Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy in the dynamic world of […]
‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel
Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish covert command-and-control (C2) channels, effectively […]
Windows tips for reducing the ransomware threat
As Scattered Spider headlines have reminded us of late, ransomware is always in season. The group has been around for many years, and this year […]
6 ways hackers hide their tracks
CISOs have an array of ever-growing tools at their disposal to monitor networks and endpoint systems for malicious activity. But cybersecurity leaders face a growing […]
HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
Security researchers have unveiled a fundamental vulnerability in HTTP/1.1 that could allow attackers to hijack millions of websites, highlighting a persistent threat that has plagued […]