Topic: attack detection
-
Noisy Ransomware Uncovered a Long-Term Espionage Operation
A ransomware group's disruptive attack on two Russian companies inadvertently exposed a long-running, sophisticated cyber espionage operation, highlighting how a visible breach can mask a more insidious threat. The espionage group, QuietCrabs, used a stealthy multi-stage attack with unique malwar...
Read More » -
How Hackers Weaponize Legitimate Tools for Cyberattacks
Threat actors increasingly use legitimate organizational tools through Living-off-the-Land (LotL) techniques, with 84% of modern cyberattacks exploiting trusted applications to bypass traditional defenses and evade detection. Attackers initiate breaches via social engineering, such as malicious V...
Read More » -
Linux Kernel Runtime Guard 1.0.0 Released: Major Updates & Expanded Support
LKRG 1.0.0 has been released after over seven years of development, offering real-time monitoring of the Linux kernel to detect tampering and exploitation without kernel modifications. This version enhances stability, performance, and compatibility, supporting kernels up to 6.17-rc4 and improving...
Read More » -
Ransomware Payouts Hit Record $3.6M as Attacks Evolve
The average ransom payment surged 44% to a record $3.6 million, even as the number of ransomware incidents decreased, indicating a shift toward more targeted attacks. Despite fewer attacks, 70% of victimized organizations paid ransoms, with critical sectors like healthcare and government facing a...
Read More » -
WordPress Plugin Flaw Gives Hackers Admin Access
A severe vulnerability (CVE-2026-23550) in the Modular DS WordPress plugin is being actively exploited, allowing attackers to gain full administrative control over websites with over 40,000 active installations. The flaw, present in versions 2.5.1 and older, stems from inadequate request verifica...
Read More »