The Good, the Bad and the Ugly in Cybersecurity – Week 51

The Good | DoJ Sentences Key Member of Raccoon Stealer Operation to Five Years In…

Understanding Identity and Access Management (IAM)

Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and…

Understanding Basics of Apache Kafka

Apache Kafka is an open-source platform designed for building real-time data pipelines and streaming applications.…

Using map Command in Splunk

The map command in Splunk is a powerful tool that enables executing secondary searches based…

Splunk: Using collect Command for Creating New Events in a New Index

In some scenarios, you may need to save the results of a search into another…

BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686)

BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) BeyondTrust’s Privileged Remote Access (PRA) and Remote…

Now You See Me, Now You Don’t: Using LLMs to Obfuscate Malicious JavaScript

This article demonstrates how AI can be used to modify and help detect JavaScript malware.…

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches…

Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation

Sophos has released hotfixes to address three security flaws in Sophos Firewall products that could…

Holiday Bonus-Themed QR Code-Based Credential Phishing

Author: Kahng AnCofense Intelligence has recently identified a series of end-of-year and holiday bonus-themed credential…