Blog

  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

    Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

    Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT.
    “Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain leverages mshta.exe for

  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

    [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

    Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done.
    Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isn’t

  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

    Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

    Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in.
    The move comes weeks after the social media behemoth announced its plans to train its AI models

  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

    Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

    Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers.
    “Criminals targeted our customer support agents overseas,” the company said in a statement. “They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1% of Coinbase monthly

  • Pen Testing for Compliance Only? It’s Time to Change Your Approach

    Pen Testing for Compliance Only? It’s Time to Change Your Approach

    Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected.
    This situation isn’t theoretical: it

  • New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

    New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

    Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild.
    The high-severity vulnerability, tracked as CVE-2025-4664 (CVSS score: 4.3), has been characterized as a case of insufficient policy enforcement in a component called Loader.
    “Insufficient policy enforcement in Loader in Google

  • 5 BCDR Essentials for Effective Ransomware Defense

    5 BCDR Essentials for Effective Ransomware Defense

    Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive

  • Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

    Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

    Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild.
    The vulnerability, tracked as CVE-2025-4632 (CVSS score: 9.8), has been described as a path traversal flaw.
    “Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to

  • BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

    BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

    At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug.
    Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware

  • Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

    Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

    A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion in transactions since 2022, making it the second major black market to be exposed after HuiOne Guarantee.
    According to a report published by blockchain analytics firm Elliptic, merchants on the marketplace have been found to peddle technology, personal data, and money laundering