Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Mobile App Security & Google's Data Safety Launch - Yay or Nay?

Internet and software giant Google recently recalibrated how it categorizes its Playstore apps. Google's Android applications are tagged with 'nutrition labels' based on the security practices and the data they collect from users to share with third parties. The recently announced Google Play's Data Safety section goes into action from July 20th.

CrowdStrike Falcon Pro for Mac Achieves Highest Score in AV-TEST MacOS Evaluation for Business Users (March 2022)

CrowdStrike is the only vendor to achieve the highest possible score of 18 points in protection, performance and usability out of all four tested vendors during the AV-TEST MacOS evaluation for business users in March 2022.

RedLine Stealer Campaign Using Binance Mystery Box Videos to Spread GitHub-Hosted Payload

RedLine Stealer is a malware that emerged in 2020, discovered in underground forums being sold in different plans, starting from $100 per month. The malware offers many capabilities for device reconnaissance, remote control, and information stealing, including: Since its discovery, attackers have used many different vectors to spread this stealer, including through fake installers and fake game hacking tools. Also, RedLine Stealer was found in compromised devices by the DEV-0537 hacking group (a.k.a.

New Typosquating Attack on npm Package 'colors' Using Cross language Technique Explained

All developers are prone to mistakes that leave them open to typosquatting attacks. Tiredness, dirty keyboard, or software issues may lead to typing some letters twice. Everyone would like to see a red screen and alarm coming out of the computer in such a case, but sadly, it doesn’t always work that way with most supply chain attacks.

Are CISOs Prepared to manage today's security threat and achieve digital resilience?

The global pandemic has tilted the scales in favor of cybercriminals, who adapted their attack strategy to exploit the vulnerabilities in the existing security systems in the organizations. Added to this, the global mindset of businesses to shift to a remote and hybrid work environment has exacerbated the threat landscape resulting in high ransomware attacks and data breaches across the industries and geographies.

Springing 4 Shells: The Tale of Two Spring CVEs

The Splunk Threat Research Team (STRT) has been heads-down attempting to understand, simulate, and detect the Spring4Shell attack vector. This post shares detection opportunities STRT found in different stages of successful Spring4Shell exploitation. At the time of writing, there are two publicly known CVEs: CVE-2022-22963, and CVE-2022-22965. The Splunk Security Content below is designed to cover exploitation attempts across both CVEs.