Crafting malware with modern metals.
This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss “Rust for Malware Development.” In pursuit of simulating real adversarial…
This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss “Rust for Malware Development.” In pursuit of simulating real adversarial…
By the CyberWire staff At a glance. CISA extends MITRE’s funding period to prevent lapse in CVE program. Maximum-severity RCE flaw affects Erlang’s SSH implementation.…
A sophisticated new Android malware strain called “Gorilla” has emerged in the cybersecurity landscape, specifically designed to intercept SMS messages containing one-time passwords (OTPs). This…
With incidences of ransomware on the rise, nobody should even be thinking that an attack is something that couldn’t happen to them, let alone speak…
There are many things to regret as one nears death, but I understand people tend to regret most the things they didn’t do rather than…
Security researchers have identified a concerning trend in the cyber threat landscape as state-sponsored hackers from multiple countries have begun adopting a relatively new social…
The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a prominent phishing-as-a-service (PhaaS) platform, was shut down. LabHost, known for…
Working in the information security field it’s frequently handy to be able to browse the web in different configurations. Sometimes you want to be able…
A federal judge has issued a preliminary injunction that significantly limits the Department of Government Efficiency’s (DOGE) access to sensitive Social Security Administration (SSA) data.…
1.1 Emerging Cybersecurity Technologies As we move into 2025, AI and machine learning are expected to play an even larger role in cybersecurity. These technologies…
In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has exploited a critical vulnerability in Ivanti Connect Secure VPN appliances.…
Millions of us know the trick of getting our public IP address. Most go to ipchicken or the site aptly called “whatismyip”. Well, Google just…