SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

26/02/2025 0 Comments 0 tags

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it’s clear this isn’t just a human

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

26/02/2025 0 Comments 0 tags

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

26/02/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV)

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

25/02/2025 0 Comments 0 tags

Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

25/02/2025 0 Comments 0 tags

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

25/02/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and cryptocurrency investors under the guise of open-source projects hosted on GitHub. The campaign, which spans hundreds of

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

25/02/2025 0 Comments 0 tags

A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated with Adlice’s product suite to sidestep detection efforts and deliver the Gh0st RAT malware. “To further evade

5 Active Malware Campaigns in Q1 2025

25/02/2025 0 Comments 0 tags

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

25/02/2025 0 Comments 0 tags

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a known malware called FatalRAT. “The threat was orchestrated by attackers

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

25/02/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws impacting Adobe ColdFusion and Oracle Agile Product Lifecycle Management (PLM) to its Known Exploited Vulnerabilities (KEV) catalog,