Security researchers have identified a sophisticated attack campaign attributed to APT37, a North Korean state-sponsored hacking group also known as ScarCruft, Reaper, and Red Eyes. […]
Google Pays Out Nearly $12M in 2024 Bug Bounty Program
The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories. The original article found […]
CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog
CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation by the XE Group. […]
‘SideWinder’ Intensifies Attacks on Maritime Sector
The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities. The original article found on darkreading Read More
APT ‘Blind Eagle’ Targets Colombian Government
The South American-based advanced persistent threat group is using an exploit with a “high infection rate,” according to research from Check Point. The original article […]
Ex-Employee Found Guilty in Revenge Kill-Switch Scheme
Clandestine kill switch was designed to lock out other users if the developer’s account in the company’s Windows Active Directory was ever disabled. The original […]
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. “The polymorphic extensions create a pixel […]
GitHub-Hosted Malware Infects 1M Windows Users
Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the […]
When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts
In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds. […]
Why The Modern Google Workspace Needs Unified Security
The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also […]