PhishingSecurity Nothing to steal? Let’s wipe. We’re analyzing the Shai Hulud 2.0 npm worm by admin December 3, 2025 by admin December 3, 2025 In September, a new breed of malware distributed via compromised Node Package Manager (npm)… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the vulnerability landscape in Q3 2025 by admin December 3, 2025 by admin December 3, 2025 In the third quarter, attackers continued to exploit security flaws in WinRAR, while the… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the TTPs of hacktivists and APTs targeting Russian organizations by admin October 7, 2025 by admin October 7, 2025 Hacktivism and geopolitically motivated APT groups have become a significant threat to many regions… 0 FacebookTwitterPinterestEmail
PrivacySecurity Danabot: Analyzing a fallen empire by admin October 7, 2025 by admin October 7, 2025 As announced by the US Department of Justice – the FBI and US DoD’s… 0 FacebookTwitterPinterestEmail