Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

30/06/2025 0 Comments 0 tags

Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in

⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

30/06/2025 0 Comments 0 tags

Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

28/06/2025 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that

GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

28/06/2025 0 Comments 0 tags

The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. “Recent campaigns in

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

28/06/2025 0 Comments 0 tags

Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

27/06/2025 0 Comments 0 tags

Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

27/06/2025 0 Comments 0 tags

A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related to Tibet,

Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

27/06/2025 0 Comments 0 tags

A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden rootkit. The activity

Business Case for Agentic AI SOC Analysts

27/06/2025 0 Comments 0 tags

Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are expected

MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

27/06/2025 0 Comments 0 tags

Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that attackers may be preparing for another mass