Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds

Organizations today face an ever-expanding threat landscape that requires sophisticated…

How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot

The discovery of a compromised endpoint in an organization’s network…

Writing Effective Detection Rules With Sigma, YARA, And Suricata

In the ever-evolving world of cybersecurity, the ability to detect…

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged,…

Polnische Raumfahrtbehörde kämpft mit Cyberattacke

Die polnische Raumfahrtbehörde POLSA wurde Ziel eines Cyberangriffs. BUTENKOV ALEKSEI…

Chinese APT Mustang Panda Debuts 4 New Attack Tools

The notorious nation-state-backed threat actor has added two new keyloggers,…

Arkana Ransomware Group Claims Compromise of US Telecom Companies

The largest US internet provider, WideOpenWest (WOW!), is allegedly compromised…

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium,…