Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 Features To Look For in a Password Manager

A password manager protects your online accounts by storing all your passwords in one place, making it easier to use strong, unique passwords for every account without having to remember them all. Many password managers also support passkeys, which make logging in even safer and easier as an alternative to traditional passwords.

How CleanINTERNET DNS Stops DNS Tunneling Before It Starts

Modern cyber threats are increasingly stealthy. A favorite tactic? DNS tunneling—a method used to bypass traditional network security controls by hiding malicious traffic inside DNS queries and responses. This can be done by embedding or encoding command and control instructions or data within subdomains or DNS record fields like TXT, CNAME or other rarely used record types.

FTC Advisory: How to Protect Yourself Against Job Scams

The US Federal Trade Commission (FTC) has issued an advisory warning of job scams that impersonate well-known companies with tempting employment opportunities. The scammers are trying to steal users’ personal and financial information in order to steal their money or launch further attacks.

Thousands of Spoofed News Sites Are Pushing Push Investment Fraud Scams

Scammers are using over 17,000 phony news sites to push investment fraud, according to a new report from CTM360. These websites, which the researchers call “Baiting News Sites (BNS),” spread via legitimate ad platforms such as Google or Meta. The sites impersonate well-known news providers, including CNN, the BBC, CNBC, News24, and ABC News. If a user clicks on one of these sites, they’ll be shown a fake news article about a well-known figure promoting a phony investment opportunity.

Thousands of WordPress Sites at Risk After Gravity Forms Breach

A critical vulnerability in the popular Gravity Forms WordPress plugin has led to widespread malware injections across thousands of sites. The flaw is being actively exploited by threat actors, some of whom are inserting backdoors and malicious JavaScript into WordPress sites to carry out data theft, SEO poisoning, and client-side attacks.

Trustwave MDR Accelerates Automotive Company's Cybersecurity Posture

For many organizations, especially those in industries like automotive manufacturing, navigating escalating cyber threats and meeting stringent insurance requirements is no simple endeavor. This is where a robust solution like Trustwave Managed Detection and Response (MDR) can make all the difference.

Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft

Malicious APKs (Android Package Kit files) continue to serve as one of the most persistent and adaptable delivery mechanisms in mobile threat campaigns. Threat actors routinely exploit social engineering and off-market distribution to bypass conventional security controls and capitalize on user trust to steal a variety of data, such as log in credentials.

Greedy Sponge Targets Mexico with AllaKore RAT and SystemBC

A financially-motivated threat actor, active since early 2021, has been targeting Mexican organizations with custom packaged installers that deliver a modified version of AllaKore RAT. Arctic Wolf documented 2022 and 2023 campaign samples from this unidentified threat actor in a previous report. We are now referring to this group as Greedy Sponge, due to its financial focus and prior use of a popular “SpongeBob” meme on its C2.

Modern application control, done right with least privilege

When attackers gain access to a single endpoint—like a developer’s workstation or an HR system—it’s often game over. With some skill and patience, that foothold can escalate into full-blown disruption: stolen data, operational downtime, and brand damage. For years, technologies like application control have served as the frontline defense against this. But in a world rife with rapid change and evolving threats, traditional approaches are showing their age.