The Good, the Bad and the Ugly in Cybersecurity – Week 51
The Good | DoJ Sentences Key Member of Raccoon Stealer Operation to Five Years In…
Understanding Identity and Access Management (IAM)
Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and…
Understanding Basics of Apache Kafka
Apache Kafka is an open-source platform designed for building real-time data pipelines and streaming applications.…
Using map Command in Splunk
The map command in Splunk is a powerful tool that enables executing secondary searches based…
Splunk: Using collect Command for Creating New Events in a New Index
In some scenarios, you may need to save the results of a search into another…
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686)
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) BeyondTrust’s Privileged Remote Access (PRA) and Remote…
Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript
This article demonstrates how AI can be used to modify and help detect JavaScript malware.…
Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)
Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches…
Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation
Sophos has released hotfixes to address three security flaws in Sophos Firewall products that could…
Holiday Bonus-Themed QR Code-Based Credential Phishing
Author: Kahng AnCofense Intelligence has recently identified a series of end-of-year and holiday bonus-themed credential…