Three Password Cracking Techniques and How to Defend Against Them

26/02/2025 0 Comments 0 tags

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one.

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

26/02/2025 0 Comments 0 tags

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from

SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

26/02/2025 0 Comments 0 tags

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it’s clear this isn’t just a human

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

26/02/2025 0 Comments 0 tags

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

26/02/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed two security flaws impacting Microsoft Partner Center and Synacor Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV)

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

25/02/2025 0 Comments 0 tags

Opposition activists in Belarus as well as Ukrainian military and government organizations are the target of a new campaign that employs malware-laced Microsoft Excel documents as lures to deliver a

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

25/02/2025 0 Comments 0 tags

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

25/02/2025 0 Comments 0 tags

Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and cryptocurrency investors under the guise of open-source projects hosted on GitHub. The campaign, which spans hundreds of

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

25/02/2025 0 Comments 0 tags

A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated with Adlice’s product suite to sidestep detection efforts and deliver the Gh0st RAT malware. “To further evade

5 Active Malware Campaigns in Q1 2025

25/02/2025 0 Comments 0 tags

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods. Below is an overview of