Recent Blog Posts

Lorem Ipsum has been the industry's standard dummy text.

Showing posts from April, 2026Show all
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
The Hidden Security Risks of Shadow AI in Enterprises
Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
Block the Prompt, Not the Work: The End of "Doctor No"
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069