Cybersecurity
-
Threat Intelligence
New Coalfire Report Reveals CISOs Rising Influence
WESTMINSTER, Colo., Jan. 18, 2023 /PRNewswire/ — In partnership with the world-class Dark Reading research team, global cybersecurity pioneer Coalfire today unveiled its second…
-
Malware Analysis
How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
-
Carding
400,000 Korean Credit Cards Leaked Overseas
SEOUL, June 8 (Yonhap) — Details of some 900,000 credit cards held by South Koreans were leaked and traded on…
-
Web Applications
Magento Based Stores See Biggest Attack Due to 0day flaw
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed…
-
Web Applications
Magento Based Stores See Biggest Attack Due to 0day flaw
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed…
-
Threat Intelligence
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The newly released ChatGPT artificial intelligence bot from OpenAI could be used to usher in a new dangerous wave of…
-
Threat Intelligence
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The newly released ChatGPT artificial intelligence bot from OpenAI could be used to usher in a new dangerous wave of…
-
Threat Intelligence
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
Names such as Novelli, orangecake, Pirat-Networks, SubComandanteVPN, and zirochka are unlikely to mean anything to a vast majority of enterprise…
-
Threat Intelligence
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
Names such as Novelli, orangecake, Pirat-Networks, SubComandanteVPN, and zirochka are unlikely to mean anything to a vast majority of enterprise…
-
Malware Analysis
IcedID Malware Updates new techniques To Avoid Detection
by Paul Kimayong In our previous blog about IcedID, we explored some of the changes in the malware and how it tries to…