Tag: tool
-
How GlassWorm wormed its way back into developers’ code, and what it says about open source security
Tags: access, ai, attack, blockchain, ciso, control, credentials, crypto, cybersecurity, data, data-breach, endpoint, exploit, framework, github, google, infrastructure, law, malicious, malware, marketplace, monitoring, open-source, resilience, service, software, supply-chain, threat, tool, update, wormadhamu.history-in-sublime-merge (downloaded 4,000 times)ai-driven-dev.ai-driven-dev (downloaded 3,300 times)yasuyuky.transient-emacs (downloaded 2,400 times)All three GlassWorm extensions are “still literally invisible” in code editors, the researchers note. They are encoded in unprintable Unicode characters that look like blank space to the human eye, but execute as JavaScript.The attackers have posted new transactions to the Solana blockchain that outline updated…
-
How GlassWorm wormed its way back into developers’ code, and what it says about open source security
Tags: access, ai, attack, blockchain, ciso, control, credentials, crypto, cybersecurity, data, data-breach, endpoint, exploit, framework, github, google, infrastructure, law, malicious, malware, marketplace, monitoring, open-source, resilience, service, software, supply-chain, threat, tool, update, wormadhamu.history-in-sublime-merge (downloaded 4,000 times)ai-driven-dev.ai-driven-dev (downloaded 3,300 times)yasuyuky.transient-emacs (downloaded 2,400 times)All three GlassWorm extensions are “still literally invisible” in code editors, the researchers note. They are encoded in unprintable Unicode characters that look like blank space to the human eye, but execute as JavaScript.The attackers have posted new transactions to the Solana blockchain that outline updated…
-
APT37 hackers abuse Google Find Hub in Android data-wiping attacks
North Korean hackers from the KONNI activity cluster are abusing Google’s Find Hub tool to track their targets’ GPS positions and trigger remote factory resets of Android devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/
-
APT37 hackers abuse Google Find Hub in Android data-wiping attacks
North Korean hackers from the KONNI activity cluster are abusing Google’s Find Hub tool to track their targets’ GPS positions and trigger remote factory resets of Android devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt37-hackers-abuse-google-find-hub-in-android-data-wiping-attacks/
-
Tenable Is a Leader in the First-Ever Gartner® Magic Quadrant for Exposure Assessment Platforms
Tags: advisory, ai, attack, business, cloud, control, cyber, cybersecurity, data-breach, exploit, gartner, guide, identity, risk, service, technology, threat, tool, vulnerability, vulnerability-managementOur customers are proving what exposure management can do. Thank you for trusting us to be part of your mission. Key takeaways Tenable believes our evolution of exposure management and our strong, mature partner ecosystem contributed to our position as a Leader in the 2025 Gartner® Magic Quadrant for Exposure Assessment Platforms. Tenable is positioned…
-
From Compliance Boxes to Fraud Prevention: GRC Reimagined
Gong’s Tamara Lauterbach on Why Framework Maturity Matters More Than Certification. Frameworks are no longer just about checking compliance boxes; they’re becoming critical tools for governance, resilience and fraud prevention. Tamara Lauterbach, senior GRC specialist at Gong, explains how culture, automation and human insight can enhance framework effectiveness. First seen on govinfosecurity.com Jump to article:…
-
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform.The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads. The First seen…
-
AI, Adaptability, Ease: What’s New in DataDome’s Q3 2025 Platform Updates
Discover DataDome’s Q3 2025 product & platform updates, including AI-driven fraud defense, adaptive protection, and new tools to control, monetize, and secure evolving AI traffic. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/ai-adaptability-ease-whats-new-in-datadomes-q3-2025-platform-updates/
-
AI, Adaptability, Ease: What’s New in DataDome’s Q3 2025 Platform Updates
Discover DataDome’s Q3 2025 product & platform updates, including AI-driven fraud defense, adaptive protection, and new tools to control, monetize, and secure evolving AI traffic. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/ai-adaptability-ease-whats-new-in-datadomes-q3-2025-platform-updates/
-
‘Landfall’ Malware Targets Samsung Galaxy Users
The tool let its operators secretly record conversations, track device locations, capture photos, collect contacts, and perform other surveillance on compromised devices. First seen on darkreading.com Jump to article: www.darkreading.com/mobile-security/landfall-malware-targeted-samsung-galaxy-users
-
China-Aligned UTA0388 Uses AI Tools in Global Phishing Campaigns
Volexity has linked spear phishing operations to China-aligned UTA0388 in new campaigns using advanced tactics and LLMs First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/china-aligned-uta0388-ai-tools/
-
Crypto-less Crypto Investment Scams: A California Case
Tags: access, apt, blockchain, breach, business, china, communications, control, crime, crypto, cybercrime, data, email, finance, group, intelligence, international, jobs, network, office, organized, scam, theft, tool, usaMy readers will know by now that I am addicted to PACER – the Public Access to Court Electronic Records. When I see headlines like this one, I am compelled to dive in and read every publicly released document related to the case. USAO Central California The headline last month was that Shengsheng He, a…
-
Crypto-less Crypto Investment Scams: A California Case
Tags: access, apt, blockchain, breach, business, china, communications, control, crime, crypto, cybercrime, data, email, finance, group, intelligence, international, jobs, network, office, organized, scam, theft, tool, usaMy readers will know by now that I am addicted to PACER – the Public Access to Court Electronic Records. When I see headlines like this one, I am compelled to dive in and read every publicly released document related to the case. USAO Central California The headline last month was that Shengsheng He, a…
-
Vibe-codierte Ransomware auf Microsoft Marketplace entdeckt
Tags: access, ai, control, github, infrastructure, malware, marketplace, microsoft, ransomware, tool, vulnerabilityForscher haben eine Visual- Studio- Code-Erweiterung mit Ransomware-Funktionen entdeckt.Der Sicherheitsspezialist Secure Annex stellte kürzlich fest, dass eine Schadsoftware namens ‘Ransomvibe” in Erweiterungen für den Quellcode-Editor Visual Studio Code eingebettet wurde. ‘Sobald die Erweiterung aktiviert ist, wird zunächst die Funktion zipUploadAndEcnrypt ausgeführt. Diese Funktion wendet alle für Ransomware und Erpressungssoftware typischen Techniken an”, heißt es im…
-
Vibe-codierte Ransomware auf Microsoft Marketplace entdeckt
Tags: access, ai, control, github, infrastructure, malware, marketplace, microsoft, ransomware, tool, vulnerabilityForscher haben eine Visual- Studio- Code-Erweiterung mit Ransomware-Funktionen entdeckt.Der Sicherheitsspezialist Secure Annex stellte kürzlich fest, dass eine Schadsoftware namens ‘Ransomvibe” in Erweiterungen für den Quellcode-Editor Visual Studio Code eingebettet wurde. ‘Sobald die Erweiterung aktiviert ist, wird zunächst die Funktion zipUploadAndEcnrypt ausgeführt. Diese Funktion wendet alle für Ransomware und Erpressungssoftware typischen Techniken an”, heißt es im…
-
Vibe-codierte Ransomware auf Microsoft Marketplace entdeckt
Tags: access, ai, control, github, infrastructure, malware, marketplace, microsoft, ransomware, tool, vulnerabilityForscher haben eine Visual- Studio- Code-Erweiterung mit Ransomware-Funktionen entdeckt.Der Sicherheitsspezialist Secure Annex stellte kürzlich fest, dass eine Schadsoftware namens ‘Ransomvibe” in Erweiterungen für den Quellcode-Editor Visual Studio Code eingebettet wurde. ‘Sobald die Erweiterung aktiviert ist, wird zunächst die Funktion zipUploadAndEcnrypt ausgeführt. Diese Funktion wendet alle für Ransomware und Erpressungssoftware typischen Techniken an”, heißt es im…
-
Sysdig stellt neue Features in Falco vor
Falco hat sich als Goldstandard für die Erkennung von Cloud-Bedrohungen zur Laufzeit etabliert, und Stratoshark entwickelt sich schnell zum beliebtesten Tool für die tiefgehende Analyse von Cloud-Systemen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sysdig-stellt-neue-features-in-falco-vor/a42672/
-
Sysdig verbessert Bedrohungsanalyse mit einer tieferen Integration in CloudTool Stratoshark
Sysdig hat neue Open-Source-Funktionen für Falco zur Untersuchung und Analyse von Bedrohungen vorgestellt. Falco ist der Standard für die Erkennung von Cloud-Bedrohungen zur Laufzeit und wird von mehr als 60 Prozent der Fortune-500-Unternehmen verwendet. Diese Updates vertiefen die Integrationsfähigkeit von Falco mit Stratoshark und schaffen eine einheitliche, durchgängige Cloud-Security-Workload, die vollständig auf Open Source basiert.…
-
Sysdig verbessert Bedrohungsanalyse mit einer tieferen Integration in CloudTool Stratoshark
Sysdig hat neue Open-Source-Funktionen für Falco zur Untersuchung und Analyse von Bedrohungen vorgestellt. Falco ist der Standard für die Erkennung von Cloud-Bedrohungen zur Laufzeit und wird von mehr als 60 Prozent der Fortune-500-Unternehmen verwendet. Diese Updates vertiefen die Integrationsfähigkeit von Falco mit Stratoshark und schaffen eine einheitliche, durchgängige Cloud-Security-Workload, die vollständig auf Open Source basiert.…
-
Sysdig verbessert Bedrohungsanalyse mit einer tieferen Integration in CloudTool Stratoshark
Sysdig hat neue Open-Source-Funktionen für Falco zur Untersuchung und Analyse von Bedrohungen vorgestellt. Falco ist der Standard für die Erkennung von Cloud-Bedrohungen zur Laufzeit und wird von mehr als 60 Prozent der Fortune-500-Unternehmen verwendet. Diese Updates vertiefen die Integrationsfähigkeit von Falco mit Stratoshark und schaffen eine einheitliche, durchgängige Cloud-Security-Workload, die vollständig auf Open Source basiert.…
-
MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks
The infamous Meow attack, which devastated unsecured databases since 2020, has resurfaced with renewed force through MAD-CAT (Meow Attack Data Corruption Automation Tool). This custom-built adversarial simulation tool demonstrates how easily attackers can corrupt data across multiple database platforms simultaneously, highlighting a critical vulnerability that continues to plague modern infrastructure. The Evolution of Meow While Meow attack…
-
MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks
The infamous Meow attack, which devastated unsecured databases since 2020, has resurfaced with renewed force through MAD-CAT (Meow Attack Data Corruption Automation Tool). This custom-built adversarial simulation tool demonstrates how easily attackers can corrupt data across multiple database platforms simultaneously, highlighting a critical vulnerability that continues to plague modern infrastructure. The Evolution of Meow While Meow attack…
-
Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce
Tags: attack, breach, cyber, cybersecurity, data-breach, exploit, group, infrastructure, monitoring, ransomware, service, software, supply-chain, tool, vulnerabilityCybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure to deploy ransomware across multiple UK organisations throughout early 2025. The investigation reveals how two prominent ransomware-as-a-service groups exploited critical vulnerabilities in SimpleHelp RMM software to breach downstream customers through their managed service providers. The…
-
Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce
Tags: attack, breach, cyber, cybersecurity, data-breach, exploit, group, infrastructure, monitoring, ransomware, service, software, supply-chain, tool, vulnerabilityCybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure to deploy ransomware across multiple UK organisations throughout early 2025. The investigation reveals how two prominent ransomware-as-a-service groups exploited critical vulnerabilities in SimpleHelp RMM software to breach downstream customers through their managed service providers. The…
-
NCSC Set to Retire Web Check and Mail Check Tools
The UK’s National Cyber Security Centre has urged users of its Web Check and Mail Check services to find alternatives First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ncsc-retire-web-check-mail-check/
-
NCSC Set to Retire Web Check and Mail Check Tools
The UK’s National Cyber Security Centre has urged users of its Web Check and Mail Check services to find alternatives First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ncsc-retire-web-check-mail-check/
-
Why you should purple team your SOC
Tags: attack, blueteam, breach, compliance, detection, metric, penetration-testing, phishing, powershell, PurpleTeam, service, soc, threat, tool, training. In theory, it’s about collaboration and continual improvement. In practice, it’s often a transactional service run by penetration testing firms focused on two things: proving they can bypass defences and producing a report that looks good in a board pack.That mindset doesn’t help with SOC effectiveness. A single purple team engagement doesn’t build real…
-
Why you should purple team your SOC
Tags: attack, blueteam, breach, compliance, detection, metric, penetration-testing, phishing, powershell, PurpleTeam, service, soc, threat, tool, training. In theory, it’s about collaboration and continual improvement. In practice, it’s often a transactional service run by penetration testing firms focused on two things: proving they can bypass defences and producing a report that looks good in a board pack.That mindset doesn’t help with SOC effectiveness. A single purple team engagement doesn’t build real…
-
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to break out of container isolation and gain root access to host systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were revealed by a SUSE researcher on November 5, 2025. CVE ID Affected Versions Fixed…
-
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to break out of container isolation and gain root access to host systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were revealed by a SUSE researcher on November 5, 2025. CVE ID Affected Versions Fixed…

