Fotor Review: How Good Is the AI Photo and Video Platform?

Seeking an authentic Fotor review? Look no further, as I’ve tested every aspect of the editing and design suite. Read on to learn about its many features, ease of use, and pricing. What Is Fotor? Fotor is an online platform that has been around for over a decade, with countless tools for image and video […]

A Wednesday in the Life of a Threat Hunter

Written by Chandra Rajagopalan, Principal Software Engineer, Netskope. Imagine you have a role in making sure your enterprise is secure and on a typical Wednesday, you suddenly suspect that something is amiss or you come to know of a new threat intelligence about a specific technique or tool or in the worst case, your organization […]

Researchers Discover “Bootkitty” – First UEFI Bootkit Targeting Linux Kernels

Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed for Linux systems. Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use […]

Latest Multi-Stage Attack Scenarios with Real-World Examples

Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first step to building a solid defense strategy against them. Let’s examine real-world examples of some of the most common multi-stage attack scenarios that are active […]

Black Friday and Cyber Monday Deals: 10 Reasons to Use a VPN

With Black Friday and Cyber Monday swiftly approaching, the deals on VPNs are out in full force. If you’ve ever wanted to try a VPN, there couldn’t be a better time to save on a subscription. You can even make other savings by using a VPN, but more on that later. Still, why use a […]

APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor

The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor. That’s according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around […]