Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

    Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

    October 4, 2025
    Cyber News

    Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the last three months. It described…

  • Scattered Lapsus$ Hunters Returns With Salesforce Leak Site

    Scattered Lapsus$ Hunters Returns With Salesforce Leak Site

    October 3, 2025
    Cyber News

    After claiming it would shut down, the cybercriminal collective reemerged and threatened to publish the stolen data of Salesforce customers by Oct. 10 if its demands are not met. ​ ​ ​Read More

  • Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage

    Dutch Authorities Arrest Two Teens for Alleged Pro-Russian Espionage

    October 3, 2025
    Cyber News

    Dutch Prime Minister Dick Schoof described the incident as part of a broader pattern of Russian hybrid attacks against Europe. ​ ​ ​Read More

  • Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

    Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

    October 3, 2025
    Cyber News

    A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. The DNS threat intelligence firm said it has…

  • BCI: The Thing of Nightmare or Dreams?

    BCI: The Thing of Nightmare or Dreams?

    October 3, 2025
    Cyber News

    Brain computer interface technology looks to provide users with hands-free device control, but could security ever keep up with the risks? ​ ​ ​Read More

  • UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft

    UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft

    October 3, 2025
    Cyber News

    A Chinese-language threat actor uses every part of the kill: infecting Web servers with malware, poisoning sites with SEO spam, and stealing organizational data for follow-on attacks. ​ ​ ​Read More

  • Microsoft’s Voice Clone Becomes Scary & Unsalvageable

    Microsoft’s Voice Clone Becomes Scary & Unsalvageable

    October 3, 2025
    Cyber News

    An attacker’s dream: Windows Speak for Me could integrate into apps, creating perfect voice replicas for Teams calls and AI agent interactions across multiple SaaS platforms. ​ ​ ​Read More

  • Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

    Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

    October 3, 2025
    Cyber News

    Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is “engineered for speed and propagation” rather than data theft or ransomware.…

  • ‘Confucius’ Cyberspy Evolves From Stealers to Backdoors in Pakistan

    ‘Confucius’ Cyberspy Evolves From Stealers to Backdoors in Pakistan

    October 2, 2025
    Cyber News

    The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware. ​ ​ ​Read More

  • Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

    Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

    October 2, 2025
    Cyber News

    Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of these results. The way results are delivered hasn’t kept up with today’s fast-moving threat landscape. Too often, findings are packaged into static reports, buried in PDFs or spreadsheets, and handed…

Previous Page
1 … 11 12 13 14 15 … 28
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn