Open-source Cobalt Strike port ‘Geacon’ used in macOS attacks
Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more to target macOS devices. Both…
Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more to target macOS devices. Both…
The Indian Computer Emergency Response Team (CERT-IN) has issued an alert on vulnerabilities in VMware Aria Operations. Versions of VMware Aria Operations prior to 8.12…
In December 2018 we released Hacker Dashboard, the central place for all your hacker related activities. Thanks to the community, we received great feedback on…
In cybersecurity, a vulnerability is a weakness. It’s a bad thing. Defences must be strong, unbreakable, and hardened against threats 24/7. The same sentiment seems…
Strong demand for cloud services continues to drive growth in IT spending this year, despite inflationary pressures, says Stephen Minton, vice-president of the data and…
In what seems to be a negotiation failure, the LockBit ransomware group decided to go ahead and leak the data it claimed was stolen after…
“So you work in service desk? Must be soul-killing to ask people to turn their computers off and on again all day”. This, or a…
Popular social media platform Discord has notified users it has suffered a data breach after a support agent’s account at a third party became compromised.…
French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company has announced on Monday. Lacroix…
There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish “back doors” for messaging apps through the…
In today’s interconnected digital landscape, the role of Chief Information Security Officers (CISOs) has continued to evolve as these dedicated professionals work relentlessly to safeguard…
A completely new and previously unreported form of BPFdoor was recently discovered and examined by Deep Instinct’s threat lab. The malware’s use of a Berkley…