February 21 was a dark day for the crypto market as it suffered the largest heist in its history. Attackers made off with around $1.5 billion from Bybit, the world’s second-largest crypto exchange, with experts citing it as the biggest theft – of anything – of all time. Although neither this loss nor the withdrawal of a further $5 billion by panicked investors were fatal for … [Read more...] about How to store cryptocurrency after the Bybit hack
News
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks
The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. "The monitored campaigns targeted Colombian judicial institutions and other government or private organizations, with high infection rates," Check Point said in a new analysis. "More than 1,600 victims were affected … [Read more...] about Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks
Announcing the technical preview of Elastic Cloud Serverless on Google Cloud
Elastic Cloud Serverless provides the fastest way to start and scale security, observability, and search solutions — without managing infrastructure. Today, we are excited to announce the technical preview of Elastic Cloud Serverless on Google Cloud — now available in the Iowa (us-central1) region. Elastic Cloud Serverless provides the fastest way to start and scale … [Read more...] about Announcing the technical preview of Elastic Cloud Serverless on Google Cloud
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Mar 10, 2025Ravie LakshmananCybersecurity / Malware Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The polymorphic extensions create a pixel perfect replica of the target's icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely … [Read more...] about Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
AI Agents: Your data sidekick (minus the coffee breaks)
Do you ever wish you had a personal data guru who could magically sift through all your data, spot patterns before they become problems, summarize everything in a way that actually makes sense and propose recommendations? Well, meet AI Agents—the “digital teammates” who do all that without demanding coffee breaks. I remember a time when digging through logs, events, and … [Read more...] about AI Agents: Your data sidekick (minus the coffee breaks)
How Industry Leaders are Stopping Identity Attacks
The CrowdStrike 2025 Global Threat Report highlights the ongoing threat of identity-based attacks. Adversaries are increasingly exploiting stolen credentials to evade detection, and 79% of detections overall were classified as malware-free. Valid account abuse became the primary initial access method in 35% of cloud intrusions. The report also shares that access broker … [Read more...] about How Industry Leaders are Stopping Identity Attacks
Apple reveals M3 Ultra, taking Apple silicon to a new extreme
March 5, 2025 PRESS RELEASE Apple reveals M3 Ultra, :br(xl)::br(l):taking Apple silicon to a new extreme The new chip delivers up to 2.6x the performance of M1 Ultra, along with Thunderbolt 5 connectivity and support for more than half a terabyte of unified memory — the most ever in a personal computer CUPERTINO, CALIFORNIA Apple today announced M3 Ultra, the … [Read more...] about Apple reveals M3 Ultra, taking Apple silicon to a new extreme
Cisco’s Frontier in Cybersecurity Solutions
The widespread adoption of encryption began in the mid-1990s, coinciding with the internet’s rapid growth and increasing popularity. Before encryption data was transmitted in plain text, making it vulnerable to interception by cybercriminals. The need for encryption became apparent as online activities expanded, requiring secure exchange of sensitive information like passwords … [Read more...] about Cisco’s Frontier in Cybersecurity Solutions
FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
Mar 07, 2025Ravie Lakshmanan Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). "Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in … [Read more...] about FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide
Mar 07, 2025Ravie LakshmananMalvertising / Open Source Microsoft has disclosed details of a large-scale malvertising campaign that's estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed to steal sensitive information. The tech giant, which detected the activity in early December 2024, is tracking it under the … [Read more...] about Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide