Topic: malware analysis
-
$900K XSS Bounty, HybridPetya Attack, & Burger King Censorship
Restaurant Brands International issued a DMCA takedown against researchers who exposed data vulnerabilities, despite the issues being patched after private reporting. Google distributed $1.6 million in rewards at a cloud-focused bug bounty event, contributing to a total of $2.5 million in cloud-r...
Read More » -
CISA releases Thorium: Open-source malware & forensic analysis tool
CISA launched Thorium, an open-source platform for malware analysis and forensic investigations, developed with Sandia National Labs to automate cyberattack investigations efficiently. Thorium processes 1,700+ jobs per second and 10M+ files hourly, integrating commercial and custom tools for thre...
Read More » -
Microsoft's RIFT: Open-Source Tool for Rust Malware Analysis
Microsoft released RIFT, an open-source tool for analyzing Rust-based malware, addressing challenges posed by Rust's compilation methods and large binary sizes. RIFT uses three integrated components (static analyzer, signature generator, and IDA plugin) with FLIRT and binary diffing to efficientl...
Read More » -
ShadowV2: Self-Service DDoS Attacks Now Available
ShadowV2 is a DDoS botnet that exploits misconfigured Docker containers, offering a self-service model that allows customers to launch their own cyberattacks using legitimate development tools. It uses a Python-based command-and-control infrastructure on GitHub CodeSpaces to deploy malicious cont...
Read More » -
China-Linked Hackers Exploit Cisco Firewall Zero-Days
Cisco has released emergency patches for two actively exploited zero-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) in its ASA and FTD firewall software, linked to the ArcaneDoor espionage campaign. The vulnerabilities allowed attackers, suspected to be a China-based group, to execute co...
Read More » -
Active Attacks Exploit Cisco ASA Zero-Day Flaws
A coordinated international cybersecurity alert warns of active attacks exploiting zero-day vulnerabilities in Cisco ASA and FTD software, attributed to a sophisticated, likely state-sponsored threat actor linked to previous ArcaneDoor campaigns. Two critical vulnerabilities (CVE-2025-20362 and C...
Read More » -
Top Cybersecurity Jobs Hiring in September 2025
The cybersecurity field is experiencing high demand for professionals in September 2025, with global opportunities available in various roles and work arrangements, including remote positions. Key roles being recruited for include Application Security Engineers, CISOs, Cloud Security Architects, ...
Read More »