Ransomware Defense Using the Wazuh Open Source Platform

04/11/2025 0 Comments 0 tags

Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

04/11/2025 0 Comments 0 tags

Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and extorting

Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

04/11/2025 0 Comments 0 tags

Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its

Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

04/11/2025 0 Comments 0 tags

Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. “Instead of relying on more traditional methods, the

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

03/11/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John Tuckner, the extension in

Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

03/11/2025 0 Comments 0 tags

Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

03/11/2025 0 Comments 0 tags

Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental

⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

03/11/2025 0 Comments 0 tags

Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found.

Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data

03/11/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices. According to CYFIRMA, which analyzed three

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

03/11/2025 0 Comments 0 tags

The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea.