Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Warning: Organizations Need to Prep For AI-Powered Ransomware Attacks

The rise of agentic AI tools will transform the cybercrime landscape, according to a new report from Malwarebytes. Agentic AI—which is still under development—is a step above the generative AI tools that are currently available to the public, and will likely be widely released in 2025. While these tools will have many legitimate uses, they’ll also enable cybercriminals to scale their attacks.

Make-Shift Brand Impersonation: Abusing Trusted Domains with Open Redirects

A KnowBe4 Threat Lab publication Authors: Daniel Netto, Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer Executive Summary Attackers exploit redirects that lack safeguarding mechanisms to borrow the domain reputation of the redirect service, obfuscate the actual destination and exploit trust in known sources. Whitelisting URLs, only allowing a predefined set of URLs to be rewritten, is an effective countermeasures against the vulnerability on the server side.

Fake VS Code Extension on npm Spreads Multi-Stage Malware

In a recent discovery, our research team uncovered a fake VS-code extension—truffelvscode—typosquatting the popular truffle for VS-code extension. This extension serves as a trojan horse for multi-stage malware. This blog takes a closer look at how the malicious extension operates, its obfuscation techniques, and IOCs related to this incident.

Will the UK's Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact

The recent UK Home Office proposal designed to hinder and disrupt ransomware operations through several proposed measures, including a targeted ban on ransomware payments, has again brought this question into the public square. The question of whether to pay a ransom demand is a decades-long argument with ardent opinions on both sides.

2025 OWASP Top 10 for LLM Applications: A Quick Guide

Published first as a whitepaper in late 2024, the 2025 OWASP Top 10 for LLM Applications is yet another monumental effort from OWASP made possible by a large number of experts in the fields of AI, cybersecurity, cloud technology, and beyond—including Mend.io Head of AI Bar-El Tayouri. LLMs are still new to the market but beginning to mature, and the OWASP Top 10 for LLM Applications is maturing alongside it.

Digital Shoplifting: Understanding and Combating Online Retail Fraud

According to the British Retail Consortium (BRC), shoplifting in the UK is surging. Reported cases jumped from 3.7 million to 20.4 million within a year. Viral social media clips show brazen daylight shoplifting. Reports quote frustrated shopkeepers afraid to intervene. Experts in retail, law, and economics debate the causes, blaming the economy, policing, organized crime, and justice systems. While physical shoplifting dominates headlines, digital shoplifting is equally bold and costly.

How to build your first Smart TV-application

Smart TV apps are at the peak of popularity and represent a great niche for growth. However, not everyone knows how to approach their development correctly. We can assist you with improving an existing product or breaking into this market. Let's dissect the proper strategy to smart TV app development so that it is both successful and easy to implement.

Top 5 Paraphrasing Tools for Students: A Comprehensive Review

Paraphrasing is an essential skill for students engaged in academic writing. Whether working on research papers, essays, or lesson plans, students must ensure clarity, avoid plagiarism, and generate unique content. AI paraphrasing tools have become invaluable in content creation, offering seamless paraphrasing while preserving the original meaning. This article reviews the top five AI paraphrasing tools, helping students find the most effective paraphrasing tool for their needs.

How to Secure Cross-Application Process Attack Surfaces

The organization in today's world operates on an intricately meshed fabric of software, while conversely, that interdependence invites the hacker through more doors. A vulnerability within any component of this inner dependency chain could become an open door to unauthorized disclosure of sensitive information, interruption of critical business processes, or even the demise of an entire corporation.