5 Practical Techniques for Effective Cyber Threat Hunting

Addressing cyber threats before they have a chance to strike or inflict serious damage is…

How the Cyber Essentials Certification Can Help Your Business

Cybersecurity is a vital concern for organisations, but many security strategies fall short: recent research…

London’s CNI is Under Threat

London is one of the smartest and most interconnected cities in the world. Digital infrastructure…

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

Bogus software update lures are being used by threat actors to deliver a new stealer…

Download a banker to track your parcel

In late October 2024, a new scheme for distributing a certain Android banking Trojan called…

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to…

Using CAPTCHA for Compromise: Hackers Flip the Script

Key Points In our investigations, we identified malware campaigns using fake CAPTCHA pages that mimic…

Critical Apache Struts File Upload Vulnerability (CVE-2024-53677)—Risks, Implications, and Enterprise Countermeasures

Apache has announced a critical vulnerability affecting Apache Struts (CVE-2024-53677), a widely used Java-based web…

Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

APT group Earth Koshchei, suspected to be sponsored by the SVR, executed a large-scale rogue…