
Blog Series
Cybersecurity Threats

Six Vulnerabilities Put 660,000+ Rsync...
There’s been some concerning news in the cybersecurity world: over 660,000 Rsync servers have been exposed to potential attacks due to six newly discovered vulnerabilities. Among them is a critical...
VEILDrive Attack: Microsoft Services Used...
Recent media reports claim that the ongoing attack campaign being dubbed VEILDrive is leveraging various Microsoft services. Common examples of the service being used in the VEILDrive attack campaign include...
CISA Security Requirements: Protecting Sensitive...
The U.S Cybersecurity and Infrastructure Security Agency (CISA) recently announced proposed security requirements designed to prevent adversarial nations from gaining access to American’s personal and government-related information. These proposed guidelines...
Sedexp Malware: The Stealthy Linux...
A new, sophisticated Linux malware named “sedexp” has been discovered, quietly evading detection since 2022. Its unique persistence technique, leveraging udev rules, has allowed it to operate under the radar,...
Sitting Ducks Attack: Over 1M...
In the world of cybercrime, over 1 million domains now face a risk of threat actor-initiated takeover as the Sitting Ducks attack comes to light. As per recent reports, the...
Hackers Use BingoMod Android RAT...
Recent media reports have cited cybersecurity researchers discovering a new Android remote access trojan (RAT) that’s currently referred to as BingoMod. The BingoMod Android RAT is capable of transferring funds...
Crypto Malware Python Packages Spreading...
Recent media reports have shed light on crypto malware that is being distributed via Python packages on a developer Q&A platform, Stack Exchange. The malware, if activated, is capable of...
CrowdStrike Alert: Phishing Attacks Targets...
In a recent turn of events, CrowdStrike has issued a warning pertaining to an unfamiliar threat actor. According to the CrowdStrike alert, the threat actor aims to capitalize on the...
Drive-by Download Attacks Become Distribution...
Recent findings have revealed that the Loader-as-a-Service (LaaS), known as FakeBat, is now one of the most widespread malware families in the world. The FakeBat malware uses the drive-by download...
CERT-UA Reports SickSync Campaign: Data...
Recently, the Computer Emergency Response Team of Ukraine cybersecurity (CERT-UA) issued a warning regarding a targeted cyber espionage campaign named SickSync, orchestrated by a group identified as UAC-0020 or Vermin....
APT28 HeadLace Malware Targeting European...
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidious HeadLace malware at the heart of the storm. This malevolent software, attributed to the...