“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
New Case Study: Global Retailer Overshares CSRF Tokens with Facebook [email protected] (The Hacker News)
Are your security tokens truly secure? Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here. By implementing Reflectiz’s recommendations,…
-
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions [email protected] (The Hacker News)
Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and retail in the Asia-Pacific (APAC) and Latin American (LATAM) regions. “The first sighting of its activity was in the second quarter of 2023; back then,…
-
How ESET is using AI PCs to boost endpoint security
Post ContentRead More
-
IAM compliance: Know the system controls at your disposal
Post ContentRead More
-
Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices [email protected] (The Hacker News)
Apple has been hit with a fine of €150 million ($162 million) by France’s competition watchdog over the implementation of its App Tracking Transparency (ATT) privacy framework. The Autorité de la concurrence said it’s imposing a financial penalty against Apple for abusing its dominant position as a distributor of mobile applications for iOS and iPadOS…
-
Outbreak Alert- Annual Report 2024
Post ContentRead More
-
Security could be the use case AI PCs need
Post ContentRead More
-
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp [email protected] (The Hacker News)
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA-208. “The threat actor deploys payloads primarily…
-
Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images [email protected] (The Hacker News)
Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly…
-
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More [email protected] (The Hacker News)
Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova