CISA Issues Alert on Citrix NetScaler 0-Day RCE Exploited in the Wild
28
Aug
2025

CISA Issues Alert on Citrix NetScaler 0-Day RCE Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after detecting active exploitation of a critical zero-day…

IT Work Fraud, Job Fraud, North Korean IT Workers, IT Workers Fraud
28
Aug
2025

Key Government And Private Partners Meet To Eradicate DPRK’s IT Work Fraud Scheme

The U.S. State Department in collaboration with Japan, South Korea, and private cybersecurity partners met in Tokyo, last week, to…

China linked UNC6384 targeted diplomats by hijacking web traffic
28
Aug
2025

China linked UNC6384 targeted diplomats by hijacking web traffic

China linked UNC6384 targeted diplomats by hijacking web traffic Pierluigi Paganini August 27, 2025 The China-linked APT group UNC6384 targeted…

Reality With Filters | Daniel Miessler
28
Aug
2025

Reality With Filters | Daniel Miessler

I clearly see the merits of both sides, similar to the end-to-end encryption discussion. The last few years have given…

New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials
28
Aug
2025

New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials

Cybersecurity researchers at Truesec have uncovered a sophisticated malware campaign distributing a weaponized PDF editor under the guise of “AppSuite…

UNC6395 targets Salesloft in Drift OAuth token theft campaign
28
Aug
2025

UNC6395 targets Salesloft in Drift OAuth token theft campaign

UNC6395 targets Salesloft in Drift OAuth token theft campaign Pierluigi Paganini August 28, 2025 Hackers breached Salesloft to steal OAuth/refresh…

Neovim Line Manipulation: Copy and Move Like a Pro
28
Aug
2025

Neovim Line Manipulation: Copy and Move Like a Pro

Neovim command sequences visualization (click for full size) After returning to Neovim recently, I’ve discovered some powerful techniques for manipulating…

TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures
28
Aug
2025

TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures

Over the past year, a shadowy threat actor known as TAG-144—also tracked under aliases Blind Eagle and APT-C-36—has intensified operations…

New Research and PoC Reveal Security Risks in LLM-Based Coding
28
Aug
2025

New Research and PoC Reveal Security Risks in LLM-Based Coding

A recent investigation has uncovered that relying solely on large language models (LLMs) to generate application code can introduce critical…

The relentless rise of atmospheric CO2 since 1950
28
Aug
2025

The relentless rise of atmospheric CO2 since 1950

The Keeling Curve shows atmospheric CO2’s relentless rise (click for full size) In 1958, Charles David Keeling began measuring atmospheric…

Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet
28
Aug
2025

Kea DHCP Server Vulnerability Let Remote Attacker With a Single Crafted Packet

A newly disclosed vulnerability in the widely used ISC Kea DHCP server poses a significant security risk to network infrastructure…

CISA Releases Guide to Hunt and Mitigate Chinese State-Sponsored Threats
28
Aug
2025

CISA Releases Guide to Hunt and Mitigate Chinese State-Sponsored Threats

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled a comprehensive Cybersecurity Advisory (CSA) designed to empower network defenders to detect,…