5 Ways to Connect IOCs to Real-World Threats for SOC Teams
When it comes to cyber threats, data alone isn’t enough. Security Operations Center (SOC) teams are flooded with indicators of compromise (IOCs), but without context,…
When it comes to cyber threats, data alone isn’t enough. Security Operations Center (SOC) teams are flooded with indicators of compromise (IOCs), but without context,…
Cybercriminals are leveraging the Python Package Index (PyPI) to distribute malicious tools designed to exploit TikTok and Instagram APIs for verifying stolen account credentials. Security…
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate…
The logistics firm Peter Green Chilled, a key supplier to major UK supermarkets including Tesco, Sainsbury’s, and Aldi, fell victim to a cyberattack. The company…
Cybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability affecting MDaemon Email Server to its Known Exploited Vulnerabilities (KEV) Catalog on…
LockBit, one of the most prolific ransomware gangs operating today, was breached last week revealing its inner operations with clarity. The leaked files, made briefly…
The most promising cybersecurity innovations are increasingly being developed by former incident responders, red teamers, SOC leads, and threat analysts, but there’s a lack of…
To meet today’s complex security requirements, organizations need solutions that are not only secure, but also practical and scalable. The Swissbit iShield Key 2 offers…
The bankrupt genetic testing company 23andMe has been scooped up by drug producer Regeneron Pharmaceuticals for $256 million dollars. But why would a pharmaceutical company…
May 20, 2025Ravie LakshmananMalware / Cyber Espionage High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign…
The BBC’s research and development (R&D) arm serves a public purpose, which, according to the department’s director Jatin Aythora, is to make some of the…
China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks Pierluigi Paganini May 20, 2025 China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an…