Triaging the Week 059

Vulnerabilities in Git and Node JS, hackers abuse SSH tunnels and SimpleHelp RMM, and DeepSeek AI hit by cyber attack in traiging the week 059
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
Vulnerabilities in Git and Node JS, hackers abuse SSH tunnels and SimpleHelp RMM, and DeepSeek AI hit by cyber attack in traiging the week 059
In an era of cyber threats looming large, the effectiveness of threat intelligence hinges on timely sharing with the right stakeholders. To facilitate this crucial process, the industry has developed standardized mechanisms for sharing intelligence that allows for fast, efficient,…
Malicious Python packages and fake websites, vulnerabilities in tunneling protocols, and Trump pardons Silk Road creator in triaging the week 058.
Two new initiatives released at Kraven Security! New free training courses drop and daily threat hunting packages based on OSINT reports.
Vulnerabilities for MacOS and Google OAuth, cybercriminals use AI and AWS features for ransomware, and high-speed Microsoft 365 Password Attacks in traiging the week 057.
AI spearphising, new malware targeting Android, and Ivanti zero-day flaw in triaging the week 056.
Clop ransomware gang behind massive Cleo breach, malicious ads and AI-driven scam plague the Internet, and Microsoft Teams and AnyDesk used to deliver malware in triaging the week 055.
In this complete guide, learn how to create your own custom web scraping tool to gather cyber threat intelligence using the no-code platform Octoparse.
Fake apps target mobile devices, QR codes bypass browser sandboxing, and Visual Studio Code dev tunnels exploited in triaging the week 054.
Notorious ransomware affiliate arrested, new phishing attack spotted, and Cloudflare developer domains abused by hackers in triaging the week 053.
Cyber security contractor runs wild, NHS hit by another cyber attack, and the first UEFI bootkit for Linux revealed in triaging the week 052.
C2 hunting empowers you to track down adversary C2 servers and stay a step ahead of the bad guys. This guide teaches you how to do it using Shodan.
SVG attachments used for phishing, critical vulnerabilities in Apple and Ubuntu Linux, and Phobos ransomware admin gets charged in triaging the week 051.
Scam texts target the vulnerable, massive data breaches, and new macOS malware using Flutter in triaging the week 050.
Unlock the power of the ATT&CK Navigator, discover its many use cases, and learn to visualize and map attack techniques through a user-friendly interface.