GrayAlpha Hacker Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
16
Jun
2025

GrayAlpha Hacker Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT

A new infrastructure linked to GrayAlpha, a cybercriminal entity overlapping with the notorious FIN7 group, has been exposed. This financially…

BERT Ransomware Upgrades to Attacks Linux Machines Using Weaponized ELF Files
16
Jun
2025

BERT Ransomware Upgrades to Attacks Linux Machines Using Weaponized ELF Files

A sophisticated ransomware operation known as BERT has significantly expanded its capabilities by developing weaponized ELF (Executable and Linkable Format)…

6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties
16
Jun
2025

6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties

In just a few months, Donald Trump’s second presidential term has drastically reshaped the United States federal government and moved…

Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
16
Jun
2025

Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT

Threat actors have exploited Discord’s invite system to distribute malicious links, ultimately delivering AsyncRAT and other harmful payloads. Discord, a…

New Predator spyware infrastructure revealed activity in Mozambique for first time
16
Jun
2025

New Predator spyware infrastructure revealed activity in Mozambique for first time

New Predator spyware infrastructure revealed activity in Mozambique for the first time Pierluigi Paganini June 16, 2025 Insik Group analyzed…

Windows Server
16
Jun
2025

June Windows Server security updates cause DHCP issues

Microsoft acknowledged a new issue caused by the June 2025 security updates, causing the DHCP service to freeze on some…

Why We Made a Guide to Winning a Fight
16
Jun
2025

Why We Made a Guide to Winning a Fight

I don’t think there’s anything quite so satisfying as winning a fight—especially when you land that victory with a resounding…

Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
16
Jun
2025

Over 20 Malicious Google Play Apps Steal Users’ Login Credentials

A major security alert has been issued for Android users after cybersecurity researchers uncovered more than 20 malicious applications on…

Cracking compliance. How Intigriti’s PTaaS supports CREST, DORA, GDPR, and ISO
16
Jun
2025

Cracking compliance. How Intigriti’s PTaaS supports CREST, DORA, GDPR, and ISO

Penetration Testing as a Service (PTaaS) must align with core industry standards, regulations, and certifications. This is usually done to…

IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
16
Jun
2025

IBM Backup Services Flaw Allows Hackers to Gain Elevated Access

A critical security vulnerability has been identified in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM i, potentially exposing…

Uncovering the Technique of Hiding Images in DNS TXT Entries
16
Jun
2025

Uncovering the Technique of Hiding Images in DNS TXT Entries

A curious technique has emerged: hiding images inside DNS TXT records. This approach, which at first glance seems unorthodox, leverages the…

16
Jun
2025

Uncovering the Technique of Hiding Images in DNS TXT Entries

A curious technique has emerged: hiding images inside DNS TXT records. This approach, which at first glance seems unorthodox, leverages the…