Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Signal in the noise: what hashtags reveal about hacktivism in 2025

    October 14, 2025
    Cyber News

    What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than 11,000 posts produced by over 120 hacktivist groups circulating across both the surface web and the dark web, with a particular focus on groups targeting MENA countries. The primary goal of our research is to highlight patterns in hacktivist…

  • Financial, Other Industries Urged to Prepare for Quantum Computers

    October 13, 2025
    Cyber News

    Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off. ​ ​ ​Read More

  • Critical infrastructure CISOs Can’t Ignore ‘Back-Office Clutter’ Data

    October 13, 2025
    Cyber News

    OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues. ​ ​ ​Read More

  • Generation AI: Why Today’s Tech Graduates Are At a Disadvantage

    October 13, 2025
    Cyber News

    With artificial intelligence supplanting entry-level security jobs, new cyber professionals will have to up their game to stay competitive in the industry. ​ ​ ​Read More

  • ⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    October 13, 2025
    Cyber News

    Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders,…

  • Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    October 13, 2025
    Cyber News

    Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now. Get the complete Holiday Season Security Playbook here. Bottom Line Up…

  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts

    October 11, 2025
    Cyber News

    Cybersecurity company Huntress on Friday warned of “widespread compromise” of SonicWall SSL VPN devices to access multiple customer environments. “Threat actors are authenticating into multiple accounts rapidly across compromised devices,” it said. “The speed and scale of these attacks imply that the attackers appear to control valid credentials rather than brute-forcing.” A significant chunk of…

  • Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

    October 11, 2025
    Cyber News

    Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is known for deploying the Warlock and LockBit ransomware. The threat actor’s use of the security utility was documented by Sophos last month. It’s assessed that…

  • 1Password Addresses Critical AI Browser Agent Security Gap

    October 10, 2025
    Cyber News

    The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents. ​ ​ ​Read More

  • RondoDox Botnet: an ‘Exploit Shotgun’ for Edge Vulns

    October 10, 2025
    Cyber News

    RondoDox takes a hit-and-run, shotgun approach to exploiting bugs in consumer edge devices around the world. ​ ​ ​Read More

Previous Page
1 … 35 36 37 38 39 … 56
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn