Featured Blogs
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From...
Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right
Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
How to Stop the Popups
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...
Stupid Is as Stupid Does: XDR Is About the Journey, Not the Destination
Music is lovely, isn’t it? It has the ability to brighten days with upbeat bars or provide a comfortable place...
Ransomware Task Force Releases its Comprehensive Framework for Action
Since ransomware’s introduction in 1989 in the form of the AIDS Trojan, also known as PS Cyborg, distributed on diskettes,...
Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously
In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...