Credential Theft Guide: Initial Access, Mimikatz & Post-Exploitation
What is credential theft? At its core, credential theft is the unauthorized acquisition of login credentials such as usernames, passwords, or session tokens by a…
What is credential theft? At its core, credential theft is the unauthorized acquisition of login credentials such as usernames, passwords, or session tokens by a…
Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach.…
Last week’s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. The…
A concerning development has emerged in early 2026, as IBM X-Force uncovered a likely AI-generated malware strain they named “Slopoly,” deployed during a ransomware attack…
Handala Hack is an Iranian state-linked destructive actor that combines old-school RDP-heavy intrusions with new tools like NetBird and AI-assisted wipers to devastate victim networks…
Cofense researchers have found a new phishing scam where threat actors use LiveChat software to impersonate brands like Amazon and PayPal. By chatting with victims…
The cloud is home to a dizzying amount of data. According to Cybersecurity Ventures, nearly half of the world’s data exists in external data centers,…
NinjaOne has unveiled NinjaOne Vulnerability Management, a new solution that helps IT teams identify, prioritize, and remediate vulnerabilities faster, without relying on periodic scans from…
In recent years, ClickFix and fake CAPTCHA techniques have become a popular way for cybercriminals to distribute malware. Instead of exploiting a technical vulnerability, these…
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest…
Companies House, the UK’s business registrar, has successfully rebooted its online WebFiling service after it emerged that a previously-unknown cyber security issue exposed various data…
Tensions between China and Costa Rica have intensified following allegations tied to an ICE cyberattack that Costa Rican authorities say was linked to the cyberespionage group UNC2814. The…