After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer...
An in-depth look at the infrastructure connections of emerging group Orion Leaks and its possible connection to former RaaS giant LockBit. In recent months, following Operation Cronos , conducted by...
One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive data as data breaches. This is often a fatal error...
In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...
The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...
Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...
San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...
For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption...
When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the...
Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....