A SLAAC-spoofing, adversary-in-the-middle campaign is hiding the WizardNet backdoor malware inside updates for legitimate software and popular applications. ​The original article found on darkreading Read […]
Adversaries Are Toying With US Networks & DC Is Short on Answers
While nation-state actors are demonstrating how easily they can infiltrate US networks, government officials don’t seem to have a clear vision for what comes next. […]
Former CISA Head Slams Trump Admin Over ‘Loyalty Mandate’
Jen Easterly, former director of CISA, discussed the first 100 days of the second Trump administration and criticized the president’s “mandate for loyalty” during a […]
Russian APT28 hackers have redoubled efforts during Ukraine war, says French security agency
The war in Ukraine has prompted a resurgence in activity by the notorious Russian APT28/Fancy Bear group, the French ANSSI cybersecurity agency has said. According […]
Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context […]
Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks
Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing Simulator, designed to empower organizations in proactively identifying and mitigating phishing […]
Phishers Take Advantage of Iberian Blackout Before It’s Even Over
Opportunistic threat actors targeted Portuguese and Spanish speakers by spoofing Portugal’s national airline in a campaign offering compensation for delayed or disrupted flights. ​The original […]
Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according to the Federal Trade Commission […]
Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a disturbingly effective method involving fake […]
AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like Milanote to orchestrate sophisticated phishing […]