13th April – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 13th April, please download our Threat Intelligence Bulletin. TOP
Read More03-01
For the latest discoveries in cyber research for the week of 13th April, please download our Threat Intelligence Bulletin. TOP
Read MoreWe’re introducing Durable Object Facets, allowing Dynamic Workers to instantiate Durable Objects with their own isolated SQLite databases. This enables
Read MoreKey Takeaways Mailbox rules are a high-risk post-exploitation tactic. Attackers abuse native mailbox rules for exfiltration, persistence, and communication manipulation. Combined with third-party services
Read MoreWe’re introducing cf, a new unified CLI designed for consistency across the Cloudflare platform, alongside Local Explorer for debugging local
Read MoreIn the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three
Read MoreGuardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead
Read MoreOur deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The
Read MoreIn this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their
Read MoreGuardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.
Read MoreA laborban jól működő OT-biztonsági POC-k gyakran elvéreznek éles, vállalati szintű kiterjesztéskor. A hagyományos, SPAN-alapú láthatósági megoldások skálázáskor elszálló CAPEX/OPEX-et
Read More