• The Story of regreSSHion: A Resurfaced sshd Vulnerability

    In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and haunting us. Such [...]

  • Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices

    Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves stealing credential [...]

  • APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts:The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia's military intelligence [...]

  • Unveiling insider threats: the crucial role of UEBA in cybersecurity

    Every year, 34% of organizations are hit by insider attacks. Because the insider uses valid [...]

  • Kapeka: A new toolkit in Arsenal of SandStorm

    FAST FACTSKapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was formally tracked in 2024 [...]

  • Dynamic Link Dazzle: Unveiling the Dark Side of DLLs

    Fast facts:DLL side-loading is a technique for executing malicious payloads inside a masqueraded DLL by [...]

  • Logpoint’s latest release: Gain control over your security operations

    Organizations depend on their security analyst to detect, investigate, and respond to any security incident, [...]

  • The multitenant dilemma: Gaining more control over user access without compromising data isolation

    One of the main challenges for security professionals is the increasing number of silos. Among [...]

  • Beginners guide to SAP Security: Why is it important and how does it work?

    Organizations widely use SAP systems to perform daily operations throughout almost every step of the [...]

  • XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)

    Introduction XZ Utils is a set of open-source compression utilities for compressing and decompressing files [...]

  • Raspberry Robin, Not a Juicy Raspberry You Love

    Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord for distribution. The [...]

  • Inside DarkGate: Exploring the infection chain and capabilities

    As the threat landscape continually evolves, some positive developments, such as authorities tracking down Maldevs, [...]