More Stories
Secret Service Tracking People’s Locations without Warrant
This feels important: The Secret Service has used a technology called Locate X which uses location data harvested from ordinary...
Lumma Stealer Proliferation Fueled by Telegram Activity
Spreading malware via Telegram channels allows threat actors to bypass traditional detection mechanisms and reach a broad, unsuspecting audience Read...
A Fifth of UK Enterprises “Not Sure” If NIS2 Applies
Over a fifth of large UK businesses aren’t sure of their compliance responsibilities under the new NIS2 directive Read More
Five Charged in Scattered Spider Case
Five men have been indicted in connection with crimes committed by the Scattered Spider group Read More
Stories from the SOC: Registry Clues to PDF Blues: A Tale of PUA Persistence
Executive Summary Establishing persistence on a system allows a threat actor continued access or process execution across system restarts or...
USN-7091-2: Ruby vulnerabilities
USN-7091-1 fixed several vulnerabilities in Ruby. This update provides the corresponding update for ruby2.7 in Ubuntu 20.04 LTS. Original advisory...