Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds

Organizations today face an ever-expanding threat landscape that requires sophisticated…

How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot

The discovery of a compromised endpoint in an organization’s network…

Writing Effective Detection Rules With Sigma, YARA, And Suricata

In the ever-evolving world of cybersecurity, the ability to detect…

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Ransomware goes postal: US healthcare firms receive fake extortion letters

In late February, healthcare organizations across the US started receiving…

OBSCURE#BAT Malware Highlights Risks of API Hooking

Researchers discovered an attack chain that uses several layers of…

New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner

A Chinese-affiliated threat actor known for its cyber-attacks in Asia…

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera…

OpenSSL 3.5.0 Released with Support for Post-Quantum Cryptography

The OpenSSL Project has officially released version 3.5.0 of its…