top of page


Local Governments Targeted for Ransomware – How to Prevent Falling Victim
Regardless of the country, local government is essential in most citizens' lives. It provides many day-to-day services and handles...
Sergiu Marias
Jul 21, 20233 min read
Â
Â
Â


Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability
Adobe, a leading software company renowned for its creative and business solutions, has taken swift action to address a recently...
Sergiu Marias
Jul 21, 20233 min read
Â
Â
Â


Unveiling BlackByte 2.0: A Menacing Evolution of Ransomware
The ever-evolving landscape of cybersecurity continues to witness the emergence of new and sophisticated threats. BlackByte 2.0...
Sergiu Marias
Jul 10, 20233 min read
Â
Â
Â


Unveiling the Next Frontier in Cybersecurity: Quantum Resistance
As technology continues to evolve at an unprecedented pace, so do the threats lurking in the digital landscape. With the increasing power...
Sergiu Marias
Jul 7, 20232 min read
Â
Â
Â


Instagram's Twitter Alternative 'Threads' Launch Halted in Europe Over Privacy Concerns
In the fast-paced world of social media, where platforms constantly seek to outshine one another, Instagram, owned by Facebook, had plans...
Sergiu Marias
Jul 6, 20233 min read
Â
Â
Â


Cybersecurity Trends, Tactics, and Protection Strategies for 2023
As technology continues to advance at a rapid pace, the threat landscape in cyberspace evolves alongside it. To effectively protect...
Sergiu Marias
Jul 5, 20233 min read
Â
Â
Â


Evasive Meduza Stealer: A Growing Threat to Password Managers and Crypto Wallets
In a concerning development, cybersecurity experts have identified a new and highly evasive malware strain called Meduza Stealer. This...
Sergiu Marias
Jul 4, 20232 min read
Â
Â
Â


The exploitation of unpatched WordPress plugins flaws to create secret admin accounts
The internet has become an essential part of our lives, with websites serving as crucial platforms for various activities. WordPress,...
Sergiu Marias
Jul 3, 20233 min read
Â
Â
Â


PhonyC2: Iran's MuddyWater Advanced Cyber Weapon Sets New Standards in Covert Operations
The world of cybersecurity is witnessing a paradigm shift as Iran's infamous hacking group, MuddyWater, unveils its latest creation:...
Sergiu Marias
Jun 30, 20232 min read
Â
Â
Â


NPM Ecosystem Targeted by a New Campaign with Unique Execution Chain
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution chain to...
Sergiu Marias
Jun 28, 20232 min read
Â
Â
Â


Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack
An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor...
Sergiu Marias
Jun 27, 20232 min read
Â
Â
Â


U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV)...
Sergiu Marias
Jun 26, 20232 min read
Â
Â
Â


Generative-AI apps & ChatGPT: Potential risks and mitigation strategies
Losing sleep over Generative-AI apps? You're not alone or wrong. According to the Astrix Security Research Group, mid size organizations...
Sergiu Marias
Jun 23, 20233 min read
Â
Â
Â


Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor
Foreign affairs ministries in the Americas have been targeted by a Chinese state-sponsored actor named Flea as part of a recent campaign...
Sergiu Marias
Jun 22, 20232 min read
Â
Â
Â


Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces
Over 101,100 compromised OpenAI ChatGPT account credentials have found their way on illicit dark web marketplaces between June 2022 and...
Sergiu Marias
Jun 21, 20232 min read
Â
Â
Â


New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions
A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and over 70...
Sergiu Marias
Jun 20, 20233 min read
Â
Â
Â


From Cryptojacking to DDoS Attacks: Diicot Expands Tactics with Cayosin Botnet
Cybersecurity researchers have discovered previously undocumented payloads associated with a Romanian threat actor named Diicot,...
Sergiu Marias
Jun 19, 20232 min read
Â
Â
Â


Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency
Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets,...
Sergiu Marias
Jun 16, 20232 min read
Â
Â
Â


Chinese Hackers Exploit VMware Zero-Day to Backdoor Windows and Linux Systems
The Chinese state-sponsored group known as UNC3886 has been found to exploit a zero-day flaw in VMware ESXi hosts to backdoor Windows and...
Sergiu Marias
Jun 15, 20232 min read
Â
Â
Â


Over Half of Security Leaders Lack Confidence in Protecting App Secrets, Study Reveals
It might come as a surprise, but secrets management has become the elephant in the AppSec room. While security vulnerabilities like...
Sergiu Marias
Jun 14, 20234 min read
Â
Â
Â
bottom of page
