Threats Making WAVs – Incident Response to a Cryptomining Attack
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.
Read More03-01
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.
Read MoreKaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the
Read MoreWhat happened at the closing of RIPE 91? Find out here.RIPE LabsRead More
Read MoreExecutive Summary AzureHound is a data collection tool intended for penetration testing that is part of the BloodHound suite. Threat
Read MoreA recent npm supply chain attack compromised 18 popular packages. This post explains how Cloudflare’s graph-based machine learning model, which
Read MoreLearn why threat actors succeed by exploiting security weaknesses. Defend against threats with integrated platforms, improved visibility and strong IAM.
Read MoreEuropol disrupts SIM-box fraudsters, Jingle Thief exploits cloud identities for gift card theft, and PhantomCaptcha targets Ukrainian NGOs.SentinelOneRead More
Read MoreComparing WhatsApp, Discord, Snapchat, Facebook Messenger, and Telegram, based on their privacy settings and the amount of data they collect.Kaspersky
Read MoreCloudflare is partnering with Visa and Mastercard to help secure the future of agentic commerce.The Cloudflare BlogRead More
Read MoreDuring August 2025, Lab52 gained access to artifacts linked to Lazarus through DreamJob campaigns. Some of these artifacts and their
Read More