• Why Bad Actors are Transitioning to Rust

    Why Bad Actors are Transitioning to Rust

    Round and round we go. It’s the nature of cybersecurity. Hackers discover an exploitable attack avenue, and a patch is then created to block it, except it doesn’t end there. Hackers just find another vulnerability and the battle rages on. It’s not just cybersecurity companies that must constantly innovate to remain relevant. Hackers must do…

  • Legitimate Platforms Becoming not so Legitimate Playgrounds for Hackers

    Legitimate Platforms Becoming not so Legitimate Playgrounds for Hackers

    You would be hard pressed to come up with a more nostalgic image than a child running a lemonade stand in their front yard on a hot afternoon. Unfortunately, there is nothing nostalgic about what some young entrepreneurs are doing today.  A team of researchers recently uncovered a group of minors that were running what…

  • Malicious NPM packages – an increasingly popular vector

    Malicious NPM packages – an increasingly popular vector

    Cybersecurity is a complicated circular pattern. Tools, strategies, and methodologies are constantly evolving to protect more expansive attack surfaces. At the same time, hackers develop new attack vectors at unprecedented rates. Round and round it goes with no end in sight.  Companies are often aware of massive cyberattacks that land in the headlines of major…

  • Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data

    Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data

    Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data Traced back to January of this year, Okta, a publicly traded identity and access management company announced yesterday that it has been impacted by a cyber-attack claimed by the data extortion group Lapsus$. Okta and Lapsus$ disagree regarding the success of the breach, while companies like Cloudflare…

Sign Up for Updates