Blog

  • Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

    Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

    Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that, if successfully exploited, could allow websites to access a user’s entire cloud storage content, as opposed to just the files selected for upload via the tool.
    “This stems from overly broad OAuth scopes and misleading consent screens that fail to clearly explain the extent of access being granted,

  • New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

    New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

    Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot.
    Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts.
    “Rather than scanning the internet, the malware retrieves a list of targets from a command-and-control (C2) server

  • From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

    From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

    Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever.
    While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flare’s latest research, The Account and Session Takeover Economy, analyzed over 20 million stealer logs and tracked attacker activity across

  • New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

    New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

    Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet.
    The attacks, designed to mine for Dero currency, is notable for its worm-like capabilities to propagate the malware to other exposed Docker instances and rope them into an ever-growing horde of mining bots.
    Kaspersky said it observed an unidentified threat

  • Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

    Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

    Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT.
    The campaign indicates a “clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems,” the

  • Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

    Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

    Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to “worldwide cloud abuse.”
    Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,

  • AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale

    AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale

    Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of non‑human identities (NHIs) across corporate clouds.
    That population is already overwhelming the enterprise: many companies

  • Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

    Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

    Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud.
    The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the employee payroll portal and redirect

  • Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

    Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

    As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint.
    The packages, published under three different accounts, come with an install‑time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in a

  • CISO’s Guide To Web Privacy Validation And Why It’s Important

    CISO’s Guide To Web Privacy Validation And Why It’s Important

    Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices.
    – Download the full guide here.

    Web Privacy: From Legal Requirement to Business Essential
    As regulators ramp up enforcement and users grow more privacy-aware, CISOs face a mounting