News

The attack chain essentially involves breaking into misconfigured Docker APIs to execute a new container based on the Alpine ...
Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet.
GPUGate malware uses Google Ads and fake GitHub commits to steal data from IT firms since Dec 2024, bypassing sandboxes and GPU-lacking systems.
Analysis of the malware and tools used in an intrusion links a threat actor to three different ransomware-as-a-service (RaaS) ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This ...
James, a married father from upstate New York, has always been interested in AI. He works in the technology field and has ...
TL;DR Introduction If you haven’t read the previous posts, I would recommend them as a primer to the devices, BLE and what we ...
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
ReversingLabs researcher Lucija Valentić discovered malicious packages on the Node Package Manager (npm) open source ...
The study offers a blueprint for effective defense. The researchers developed a multi-layered guardrail system that ...
Many aspects of the modern internet come from IRC, or at least started with IRC. Chris Messina, an early adopter of Twitter ...