Cybersecurity

Qilin offers “Call a lawyer” button for affiliates attempting to extort ransoms from victims who won’t pay 

Qilin offers “Call a lawyer” button for affiliates attempting to extort ransoms from victims who won’t pay 

Imagine for one moment that you are a cybercriminal.

You have compromised an organisation’s network, you have stolen their data, you have encrypted their network, and you are now knee-deep in the ransomware negotiation.

However, there’s a problem. Your target is stalling for time. Who can you, as the perpetrator of the crime rather than the innocent victim, turn to for advice?

Read more in my article on the Tripwire State of Security blog.

6 Steps to 24/7 In-House SOC Success 

6 Steps to 24/7 In-House SOC Success 

Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That’s when they can count on fewer security personnel monitoring systems, delaying response and remediation.
When retail giant Marks & Spencer experienced a security event over Easter weekend, they were forced to shut down their online operations, which account for

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider 

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider 

Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per second (Tbps).
The attack, which was detected in mid-May 2025, targeted an unnamed hosting provider.
“Hosting providers and critical Internet infrastructure have increasingly become targets of DDoS attacks,” Cloudflare’s Omer

67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers 

67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers 

Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim to offer Python-based hacking tools, but deliver trojanized payloads instead.
The activity, codenamed Banana Squad by ReversingLabs, is assessed to be a continuation of a rogue Python campaign that was identified in 2023 as targeting the Python Package

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft 

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft 

Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.
“Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT said in a report

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware 

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware 

The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom calls featuring deepfaked company executives to trick them into installing malware on their Apple macOS devices.
Huntress, which revealed details of the cyber intrusion, said the attack targeted an unnamed cryptocurrency foundation employee, who received a

Secure Vibe Coding: The Complete New Guide 

Secure Vibe Coding: The Complete New Guide 

DALL-E for coders? That’s the promise behind vibe coding, a term describing the use of natural language to create software. While this ushers in a new era of AI-generated code, it introduces “silent killer” vulnerabilities: exploitable flaws that evade traditional security tools despite perfect test performance.
A detailed analysis of secure vibe coding practices is available here.
TL;DR: Secure

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session 

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session 

Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts.
It’s called “Living Off Trusted Sites” (LOTS)—and it’s the new favorite strategy of modern attackers. Instead of breaking in, they blend in.
Hackers are using well-known platforms like Google, Microsoft, Dropbox, and Slack as launchpads. They hide

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign 

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign 

Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called application specific passwords (or app passwords) as part of a novel social engineering tactic designed to gain access to victims’ emails.
Details of the highly targeted campaign were disclosed by Google Threat Intelligence Group (GTIG) and the Citizen Lab, stating the activity

Meta Adds Passkey Login Support to Facebook for Android and iOS Users 

Meta Adds Passkey Login Support to Facebook for Android and iOS Users 

Meta Platforms on Wednesday announced that it’s adding support for passkeys, the next-generation password standard, on Facebook.
“Passkeys are a new way to verify your identity and login to your account that’s easier and more secure than traditional passwords,” the tech giant said in a post.
Support for passkeys is expected to be available “soon” on Android and iOS mobile devices. The feature is

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X