A sophisticated espionage campaign orchestrated by the North Korea-backed Lazarus Group has successfully infiltrated open source software ecosystems on an unprecedented scale, transforming trusted developer tools into weapons of cyber espionage. The campaign represents a strategic evolution in state-sponsored cyber…
Tag: EN
Ransomware Groups Using TrickBot Malware to Exfiltrate US$724 Million in Cryptocurrency
The cybersecurity landscape continues to evolve as ransomware groups adopt increasingly sophisticated tactics to maximize their financial gains. The TrickBot malware family has emerged as a central component in a massive cryptocurrency extortion scheme, with ransomware-as-a-service (RaaS) groups leveraging this…
NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets
A sophisticated new threat has emerged in the cybercriminal landscape, masquerading as an educational tool while orchestrating large-scale credential theft and wallet compromise operations. NOVABLIGHT, a NodeJS-based Malware-as-a-Service (MaaS) information stealer, represents a concerning evolution in cybercrime accessibility, allowing virtually…
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools
Chinese state-sponsored hackers associated with the notorious Silk Typhoon group have filed over ten patents for sophisticated cyber espionage tools, revealing the unprecedented scope of their offensive capabilities. These patent applications, registered by companies linked to China’s Ministry of State…
China’s Covert Capabilities | Silk Spun From Hafnium
China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
How to Run a Firewall Test: A Guide for Enterprises
Cyber threats evolve quickly, and firewalls are often the first line of defense. However, having one in place isn’t the same as having one that works the way you expect…. The post How to Run a Firewall Test: A Guide…
External Attack Surface Management: The Complete Guide
With cloud services, remote work, and digital transformation accelerating the expansion of attack surfaces, relying on traditional security tools alone is no longer enough. External attack surface management (EASM) gives… The post External Attack Surface Management: The Complete Guide appeared…
Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines
Recent security research has highlighted the importance of CI/CD pipeline configurations, as documented in AWS Security Bulletin AWS-2025-016. This post pulls together existing guidance and recommendations into one guide. Continuous integration and continuous deployment (CI/CD) practices help development teams deliver…
AI meets ransomware: a new cyber threat
Ransomware has long been one of the most feared cyber threats on the internet, and for good reason. It’s fast, disruptive, and increasingly effective at locking up your most important files and demanding payment in exchange for their return. It’s…
This $599 Asus Zenbook OLED is seriously the best Windows laptop deal right now
The Asus Zenbook A14 is one of our favorite laptops of 2025, with a gorgeous OLED display, long-lasting battery, and lightweight form factor. Now, it’s $400 off. This article has been indexed from Latest news Read the original article: This…