45 Day Assessment Reveals Hidden Risks in Trusted IT Tools

A 45 day assessment of internal tools reveals that trusted utilities like PowerShell and WMIC are used in 84% of high severity incidents, shifting security focus from malware to over entitlement.

The Latest

Breaking News and Alerts

Malicious Updates to Node IPC Library Steal Developer Cloud Credentials

Three newly published versions of the Node IPC npm package contain a stealthy backdoor that exfiltrates developer credentials across 90 categories to an external server.

Spotlight

Cybersecurity Profiles and Stories

TencShell Malware Framework Uses Tencent Style Traffic to Evade Detection

The TencShell framework repurposes open source Rshell code and uses Tencent style API traffic to hide its command and control communications from security tools.

Active Exploitation Reported for Microsoft Exchange Server Spoofing Flaw

Microsoft warns that attackers are exploiting a critical cross site scripting flaw in Exchange Server's Outlook Web Access to perform network level spoofing attacks on on premises systems.

Secret Blizzard Upgrades Kazuar Into Modular Espionage Botnet

The malware has evolved from a standard backdoor into a modular ecosystem targeting government and diplomatic organizations across Europe and Central Asia.

FrostyNeighbor Group Uses Windows Scheduled Tasks for Stealthy Persistence

The FrostyNeighbor hacking group targets Ukrainian government organizations with spearphishing emails and server side filtering before abusing Windows Scheduled Tasks to maintain persistent access on compromised systems.

Features

Research and Thought Leadership