01
Jul
2025

Why Prompt Engineering and Context Engineering Both Miss the Point

There’s a popular idea going around right now about renaming “prompt engineering” to “context engineering.” The argument is that context…

Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams
30
Jun
2025

Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

For years, the North Korean government has found a burgeoning source of sanctions-evading revenue by tasking its citizens with secretly…

Scammers have a new tactic: impersonating DOGE
30
Jun
2025

Scammers have a new tactic: impersonating DOGE

Scammers are impersonating the Department of Government Efficiency in an effort to steal personal information and possibly take advantage of…

Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows
30
Jun
2025

Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows

A sophisticated phishing campaign has emerged, distributing the notorious Remcos Remote Access Trojan (RAT) through the DBatLoader malware. This attack…

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog
30
Jun
2025

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 30, 2025 U.S. Cybersecurity and…

What the NULL?! Wing FTP Server RCE (CVE-2025-47812)
30
Jun
2025

What the NULL?! Wing FTP Server RCE (CVE-2025-47812)

While performing a penetration test for one of our Continuous Penetration Testing customers, we’ve found a Wing FTP server instance…

China helps North Korean operatives land IT roles, bypassing sanctions
30
Jun
2025

US authorities unmask North Korean IT worker schemes and their American accomplices

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. The Department…

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords
30
Jun
2025

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords

The Pi Network community eagerly celebrated Pi2Day, an event traditionally associated with platform updates, feature launches, and significant milestones. However,…

Arrest, seizures in latest U.S. operation against North Korean IT workers
30
Jun
2025

Arrest, seizures in latest U.S. operation against North Korean IT workers

U.S. authorities unsealed indictments, seized financial accounts and made an arrest in the latest attempt to crack down on North…

Germany asks Google, Apple remove DeepSeek AI from app stores
30
Jun
2025

Germany asks Google, Apple to remove DeepSeek AI from app stores

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application…

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads
30
Jun
2025

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads

DragonForce Ransomware has emerged as a formidable player in the Ransomware-as-a-Service (RaaS) landscape since its debut in December 2023. Initially…

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords
30
Jun
2025

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords

Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute malware and steal cryptocurrency wallet credentials, targeting users…