How does this clever Linux Trojan operate?
Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.
Insider attack suspect was arrested this month
An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.
Here's what happened this year, in case you missed it
Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.
All of Argentina's population IDs stolen and for sale?
This new leak may compromise more than 45M people. Read this post to learn who the attacker is, how he gained access and his connection with past leaks.
Android devices are catching FluBot and TangleBot
Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.
What is the Dark Web and what do we find there?
I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we can find within it.
You could be a victim of Credential Stuffing
I wrote this post to give you an overview of the Credential Stuffing attack and some short recommendations for its prevention.
Searching for credentials in a repository
As everyone knows in our context, production credentials should be protected. In this post, we explain how to extract old credentials and how to protect them.
Attacking a network using Responder
Windows hosts use LLMNR and NBT-NS for name resolution on the local network. These protocols do not verify addresses, and here we detail how to exploit this.