09
Jun
2025

Hive Five 227 – Developers, Developers, Developers.

I made two new musical discoveries this week: Acid Bath and Ryo Fukui, exploring swamp metal and jazz. I also…

M&S says hackers gained access to customer data in April cyberattack
09
Jun
2025

Scattered Spider targeting MSPs, IT vendors in social engineering campaigns

Scattered Spider, the collective cyber-threat group suspected in the hacks of multiple retail brands in the United Kingdom, Europe and…

Wazuh header
09
Jun
2025

Designing Blue Team playbooks with Wazuh for proactive incident response

In cybersecurity, Blue Teams are responsible for defending an organization’s IT environment, including networks, endpoints, applications, and data against various…

Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants
09
Jun
2025

Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants

Security researchers at Akamai have discovered active exploitation of a critical remote code execution vulnerability in Wazuh servers, marking the…

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency
09
Jun
2025

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency

Skitnet malware, also referred to as Bossnet, has emerged as a critical tool for ransomware gangs in 2025, showcasing a…

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
09
Jun
2025

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai…

Internet infamy drives The Com's crime sprees
09
Jun
2025

Internet infamy drives The Com’s crime sprees

The Com doesn’t fit into a traditional definition of cybercrime. While the majority of groups tend to either be financially-motivated…

Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram
09
Jun
2025

Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram

A sophisticated tracking method employed by Meta (Facebook) and Yandex that potentially affected billions of Android users through covert web-to-app…

Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials
09
Jun
2025

Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials

Google has highlighted a significant uptick in cyberattacks and scams targeting US consumers, with a particular focus on stealing login…

EU launches EU-based, privacy-focused DNS resolution service
09
Jun
2025

EU launches EU-based, privacy-focused DNS resolution service

DNS4EU, an EU-based DNS resolution service created to strengthen European Union’s digital sovereignty, has become reality. What is DNS? The…

Wazuh header
09
Jun
2025

Designing Blue Team playbooks with Wazuh for proactive cyber defense

In cybersecurity, Blue Teams are responsible for defending an organization’s IT environment, including networks, endpoints, applications, and data against various…

Hackers Registered 4000+ Domains Mimic popular Major Brands
09
Jun
2025

Hackers Registered 4000+ Domains Mimic popular Major Brands

A sophisticated scam operation dubbed “GhostVendors” that exploits over 4,000 fraudulent domains to impersonate dozens of major brands and defraud…