Cybersecurity

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs. ...
spot_img

How we linked ForumTroll APT to Dante spyware by Memento Labs

In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized phishing links sent via email. No further action...

SmartApeSG campaign uses ClickFix page to push NetSupport RAT

Introduction This diary describes a NetSupport RAT infection I generated in my lab from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page. Known as ZPHP...

Drilling Down on Uncle Sam’s Proposed TP-Link Ban – Krebs on Security

The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that...

Hack halts Dutch broadcaster, forcing radio hosts back to LPs

A Dutch TV and radio broadcaster has found itself at the mercy of cybercriminals after suffering a cyber attack, and leaving it scrambling to...

Tanya – Darknet Diaries

Full Transcript Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode,...

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose...
spot_img