New MuddyWater Campaign Hits Israeli Targets
The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education.
All topics
The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education.
Researchers from Wiz are currently tracking more than 25,000 affected repositories across approximately 350 unique users.
This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the […]
The financial impacts of cyberattacks are hard to measure - but they lend critical context to conversations around security risk at the boardroom level.
The chain of discovery began with Amazon's security honeypot service, MadPot, which detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) before its public disclosure
Threat actors are now using LLMs in malware during execution, as a way to alter the malware’s behavior to enable detection evasion and more.