Cybersecurity Compliance Guide

Preparing For A New Generation Of Cybersecurity Compliance

Cybersecurity has now moved from the IT department to the CISO boardroom. European Union's NIS Directive in 2016 was a wake-up call for businesses to take cybersecurity seriously. However, our current digital dependencies have...
IDA 9.0

IDA 9.0 Released: A Reverse Engineering Tool Gets a Major Updates – What’s New!

Hex-Rays has announced the release of IDA 9.0, which introduces significant licensing changes and new features to enhance user experience and functionality across multiple platforms. The latest version of the Interactive Disassembler (IDA) software...
Researchers Backdoored Azure Automation Account Packages And Runtime Environments 

Azure Automation Account Packages & Runtime Environments Backdoored

Azure Automation is a service that automates processes across various cloud platforms, making it easier to manage complicated hybrid setups.  It comes with a runtime environment that lets users set up the environment for running...
Russian APT Hackers Tools Matrix Unveiled

Russian APT Hackers Tools Matrix Unveiled

Researcher BushidoToken unveild a comprehensive tool matrix focused on Russian Advanced Persistent Threat (APT) groups has been unveiled. This project, inspired by the success of the Ransomware Tool Matrix, aims to catalog and analyze the...
RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

RansomHub is well-known for its affiliate scheme and for employing methods to turn off or disable endpoint detection and response (EDR) to avoid discovery and extend its existence on hacked devices or networks. Experts discovered...
Why Cynet’s All-in-One Platform Is a Game-Changer for MSPs

Why Cynet’s All-in-One Platform Is a Game-Changer for MSPs

Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services based on heightened demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs to transition into a...
SambaSpy Attacking Windows Users With Weaponized PDF Files

SambaSpy Attacking Windows Users With Weaponized PDF Files

Threat actors often make use of weaponized PDF files as they enable them to deliver malware and execute attacks through phishing schemes.  These PDFs can contain embedded malicious code, links, and scripts that exploit vulnerabilities...
ANY.RUN Malware Sandbox with Splunk

SOC Analysts Can Now Use ANY.RUN Malware Sandbox with Splunk

Splunk users can now leverage ANY.RUN's sandbox and threat intelligence directly within their Splunk SOAR environment. This allows for the analysis of suspicious files and URLs within the ANY.RUN sandbox while enriching investigations with...
Malvertising Targets Outdated Windows Users

Beware of New AliGater Attacking Outdated Windows Users

Malvertising (malicious advertising) refers to the practice of embedding harmful code within online advertisements, which can lead to malware infections on users' devices.  This technique often exploits legitimate advertising networks, making it difficult for both...
Windows MiniFilter Can Be Abused tTo Bypass EDR

Windows MiniFilter Can Be Abused To Bypass EDR

The Windows MiniFilter driver, like the Sysmon driver, can be abused to prevent EDR drivers from loading.  Endpoint Detection and Response (EDR) processes are difficult for adversaries to stop, even with local administrator or system-level...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...