A sophisticated fileless Linux malware framework, ShadowHS, that represents a significant evolution in post-exploitation tooling. Unlike traditional malware binaries, ShadowHS…
Windows is shifting to a more secure authentication approach, moving away from New Technology LAN Manager (NTLM) and toward stronger,…
“Use ImageMagick® to create, edit, compose, or convert bitmap images. It can read and write images in a variety of…
Threat actors are actively targeting internet-exposed MongoDB instances in large-scale automated ransomware campaigns. The attacks follow a consistent pattern: attackers…
Notepad++ fell victim to a sophisticated supply chain attack orchestrated by state-sponsored threat actors who compromised its update infrastructure over…
“You’re invited!” It sounds friendly, familiar and quite harmless. But in a scam we recently spotted, that simple phrase is being used to trick victims into installing a full remote access tool…
Japan and Britain have agreed to expand cooperation on cybersecurity and critical mineral supply chains, framing the move as a…
Security Affairs newsletter Round 561 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini February 02, 2026 A new round of…
This is just a quick blogpost to document a behavior in the Blink engine in regards to the processing of…
For years, cybersecurity teams have worked to close gaps across email, endpoints, cloud infrastructure, and application layers. But as new…
NationStates, a multiplayer browser-based game, has confirmed a data breach after taking its website offline earlier this week to investigate…
A sophisticated JScript-based command-and-control framework, PeckBirdy, since 2023, exploiting living-off-the-land binaries (LOLBins) to deliver modular backdoors across diverse execution environments….
