Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

02/10/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

02/10/2025 0 Comments 0 tags

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

02/10/2025 0 Comments 0 tags

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

02/10/2025 0 Comments 0 tags

Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to a financially motivated threat actor known as Cl0p.

How to Close Threat Detection Gaps: Your SOC’s Action Plan

02/10/2025 0 Comments 0 tags

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is to find the real threats

Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

02/10/2025 0 Comments 0 tags

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United Arab Emirates (U.A.E.). Slovak cybersecurity

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

01/10/2025 0 Comments 0 tags

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

01/10/2025 0 Comments 0 tags

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client

How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

01/10/2025 0 Comments 0 tags

AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

01/10/2025 0 Comments 0 tags

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain