I had the opportunity to go to Tokyo, Japan for a week this month for work and while there I…
There’s been some debate in my circles recently on the topic of what type of person and background makes the…
In one of Malcolm Gladwell’s books he talked about how respect for authority has caused a massive number of plane…
In the wake of LabHost’s shutdown in April 2024, a new player has emerged in the Phishing-as-a-Service (PhaaS) landscape, positioning…
Midnight Blizzard (APT29/Cozy Bear) targets European embassies and Ministries of Foreign Affairs with sophisticated phishing emails disguised as wine tasting…
Attackers exploited SonicWall SMA appliances since January 2025 Pierluigi Paganini April 19, 2025 Threat actors are actively exploiting a remote…
This will be rough. I’ve always been attracted to the idea of identifying unifying characteristics of desired society, and defining…
I never stop being fascinated by the fact that web admins have boxes online that anyone in the world can…
In a comprehensive analysis of the ransomware landscape in the first quarter of 2025, Microsoft Threat Intelligence has highlighted significant…
One of the most depressing things in life is not being able have all your friends from various phases of…
In a concerning development within the Android ecosystem, a new malware variant known as “Gorilla” has been identified, primarily targeting…
Apr 19, 2025Ravie LakshmananLinux / Malware Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as…











