Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds

Organizations today face an ever-expanding threat landscape that requires sophisticated…

How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot

The discovery of a compromised endpoint in an organization’s network…

Writing Effective Detection Rules With Sigma, YARA, And Suricata

In the ever-evolving world of cybersecurity, the ability to detect…

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Google Quick Share Bug Bypasses Allow Zero-Click File Transfer

Google addresses patch bypasses for CVE-2024-38272 and CVE-2024-38271, part of…

WhatsApp Vulnerability Let Attackers Execute Malicious Code Via Attachments

A critical vulnerability in WhatsApp for Windows that could allow…

Chinese Hackers New Malware Dubbed ‘Squidoor’ Attacking Global Organizations

A sophisticated backdoor malware called “Squidoor” being deployed by suspected…

China-Backed Hackers Backdoor US Carrier-Grade Juniper MX Routers

Mandiant researchers found the routers of several unnamed organizations (likely…

Google to Patch 23-years Old Chrome Vulnerability That Leaks Browsing History

Google has announced a significant security improvement for Chrome version…