Detecting Malicious Activities With Traffic Distribution Systems
06
Mar
2025

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes, serving as sophisticated redirection networks…

1.4TB of Data at Risk: Tata Technologies Face Extortion by Hunters International
06
Mar
2025

Tata Technologies Hit by Hunters International Ransomware, 1.4TB Data at Risk

Tata Technologies hit by Hunters International ransomware attack. The group threatened to leak 1.4TB of data. Learn about the extortion,…

Taylor Swift concert
06
Mar
2025

Cybercrime ‘crew’ stole $635,000 in Taylor Swift concert tickets

New York prosecutors say that two people working at a third-party contractor for the StubHub online ticket marketplace made $635,000…

Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community
06
Mar
2025

Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community

Cybersecurity researchers have uncovered a sophisticated campaign targeting the Albion Online gaming community through impersonation of the Electronic Frontier Foundation…

New Powershell Module for Active Directory Assessment
06
Mar
2025

New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline Active Directory (AD) assessments. Created…

vCiso Academy
06
Mar
2025

Turning MSPs and MSSPs into Cybersecurity Powerhouses

We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable….

How to Analyse Real-Time Linux Malware Network Traffic
06
Mar
2025

How to Analyse Real-Time Linux Malware Network Traffic

Network traffic analysis has emerged as one of the most effective methods for detecting and investigating linux based malware infections…

Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis
06
Mar
2025

Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis

Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat actor infrastructure, providing valuable insights…

Ethereum
06
Mar
2025

Ethereum private key stealer on PyPI downloaded over 1,000 times

A malicious Python Package Index (PyPI)  package named “set-utils” has been stealing Ethereum private keys through intercepted wallet creation functions…

Misconfigured Apache Airflow Servers Exposes Login Credentials to Hackers
06
Mar
2025

Misconfigured Apache Airflow Servers Exposes Login Credentials to Hackers

A critical security oversight in widely used Apache Airflow instances has exposed credentials for platforms like AWS, Slack, PayPal, and…

An envelope with a question mark hides a snake inside its folds.
06
Mar
2025

Ransomware threat mailed in letters to business owners

Business owners and CEOs across the United States received customized ransomware threats this month from the most unusual of places—letters…

37K+ VMware ESXi instances vulnerable to critical zero-day
06
Mar
2025

37K+ VMware ESXi instances vulnerable to critical zero-day

Dive Brief: Broadcom on Tuesday disclosed three zero-day vulnerabilities that affect multiple VMware products, including ESXi, Workstation and Fusion. The…