images

Argo CD

Argo CD, a popular open-source tool for managing Kubernetes applications through GitOps, has a critical security flaw. A recently discovered vulnerability, CVE-2024-31989, exposes Argo CD’s […]

Read More
images

Cut the Ticket

Kerberos is a commonly used authentication protocol that leverages a robust ticket system to identify users. However, the system isn’t without vulnerabilities that attackers can […]

Read More
images

Ivanti’s Zero-day Predicament

In January 2024, a critical zero-day exploit sent shockwaves through the cybersecurity landscape. Attackers targeted Ivanti products, exploiting a combination of vulnerabilities that had been […]

Read More
images

Operation Triangulation

Kaspersky’s discovery of “Operation Triangulation”, a complex cyber-attack leveraging multiple iOS vulnerabilities, has rocked the cybersecurity landscape. This unit delves into Operation Triangulation’s attack chain, […]

Read More
images

QuasarRat with DLL Sideloading

Quasar is a remote administration tool that allows administrators to connect to and manage remote computers. Over the years, threat actors have modified Quasar to […]

Read More
images

Scattered Spider

Scattered Spider is a newly discovered threat actor that targets large players in the business enterprise sector. In September of 2023, the group launched a […]

Read More
images

QuiteRat

The Lazarus Group, a well-known cybercrime group from North Korea, has carried out sophisticated and large-scale attacks over the years. Its high-profile attacks have gained […]

Read More
images

APT40

Our latest Campaign of the Month, “APT40”, offers a deep dive into this sophisticated and malicious cyber espionage group, covering key topics and areas related […]

Read More
images

Horabot

The Horabot botnet is a sophisticated threat that has been active for over two years, primarily focusing on targets in the Americas. It uses a […]

Read More