Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • How One Bad Password Ended a 158-Year-Old Business

    How One Bad Password Ended a 158-Year-Old Business

    September 24, 2025
    Cyber News

    Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of small businesses fail within the first five years. So when KNP Logistics Group (formerly Knights of Old) celebrated more than a century and a half of operations, it had mastered the art of survival. For 158 years, KNP adapted and endured,…

  • Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms

    Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms

    September 24, 2025
    Cyber News

    U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face…

  • New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

    September 24, 2025
    Cyber News

    Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share “significant” source code overlaps with IcedID and Latrodectus. “The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks,” Zscaler ThreatLabz said in a Tuesday report.…

  • iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

    iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks

    September 24, 2025
    Cyber News

    Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages and steal credit card data by bypassing the very security policies designed to stop them. Download the complete iframe security guide here.  TL;DR: iframe Security Exposed Payment iframes are being actively exploited by attackers…

  • GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

    GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

    September 23, 2025
    Cyber News

    GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack. This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required…

  • BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

    BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

    September 23, 2025
    Cyber News

    Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor using a malware called BadIIS in attacks targeting East and Southeast Asia, particularly with a focus on Vietnam. The activity, dubbed Operation Rewrite, is being tracked by Palo Alto Networks Unit 42 under the moniker…

  • Iran-Linked Hackers Target Europe With New Malware

    Iran-Linked Hackers Target Europe With New Malware

    September 22, 2025
    Cyber News

    “Nimbus Manticore” is back at it, this time with improved variants of its flagship malware and targets that are outside its usual focus area. ​ ​ ​Read More

  • Attackers Use Phony GitHub Pages to Deliver Mac Malware

    Attackers Use Phony GitHub Pages to Deliver Mac Malware

    September 22, 2025
    Cyber News

    Threat actors are using a large-scale SEO poisoning campaign and fake GitHub repositories to deliver Atomic infostealers to Mac users. ​ ​ ​Read More

  • How to Gain Control of AI Agents and Non-Human Identities

    How to Gain Control of AI Agents and Non-Human Identities

    September 22, 2025
    Cyber News

    We hear this a lot: “We’ve got hundreds of service accounts and AI agents running in the background. We didn’t create most of them. We don’t know who owns them. How are we supposed to secure them?” Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts…

  • Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

    Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants

    September 22, 2025
    Cyber News

    A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any user, including Global Administrators, across any tenant. The vulnerability, tracked as CVE-2025-55241, has been assigned the maximum CVSS score of 10.0. It has been described by Microsoft as a privilege escalation flaw in Azure Entra.…

Previous Page
1 … 15 16 17 18 19 … 29
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn