Author Archives: [email protected]

Drive into the newest zone in World of Warcraft: Undermine

World of Warcraft has long been a favorite amongst PC gamers. Now they can explore a new zone that went live this week: the goblin city of Undermine. Mark Kelada, assistant lead quest designer for Blizzard Entertainment, writes about what to expect in this experience, including the D.R.I.V.E. feature. That stands for Dynamic and Revolutionary […]

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country’s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications. “The sender claimed that the malicious file […]

Building Better GRC Habits: Why 2025 Is the Year To Embrace Continuous Controls Monitoring

Originally published by RegScale.   Every January, we commit to building better habits. We buy gym memberships, download meditation apps, or swear to finally learn that new language. But here’s a thought: how well are our organizations carrying out their own New Year’s resolutions?  Looking at the state of GRC today, it’s clear that many […]

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai. […]

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce. The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public reporting. “The modifications seen in the TgToxic payloads reflect the actors’ ongoing surveillance of open source intelligence and demonstrate their commitment to enhancing the

The ISAC Advantage for Collective Threat Intelligence

Originally published by Zscaler.   With cyberthreats rapidly increasing in sophistication, today’s CISOs cannot afford to stand alone. To outsmart some of the world’s most ingenious and nefarious criminals, we must pool our knowledge, blend our insights, and present a united front.  We have a clear and present need to collaborate across sectors, and information sharing […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.