Searchlight Security Changes Name to Searchlight Cyber and Launches New Brand
Portsmouth, UK & Washington DC, US – December 20 2022 -- Searchlight Cyber, the dark web intelligence company, has announced its rebrand from Searchlight Security, aligning its legal entity in both...
Projects would rather get hacked than pay bounties, Web3 developer claims
As hacks and exploits continue to go rampant within the crypto industry, the importance of finding vulnerabilities to prevent potential losses becomes of utmost importance. However, a Web3 developer...
Sophisticated DarkTortilla Malware Serves Imposter Cisco, Grammarly Pages
Researchers have spotted two phishing sites — one spoofing a Cisco webpage and the other masquerading as a Grammarly site — that threat actors are using to distribute a...
Malicious Python Trojan Impersonates SentinelOne Security Client
In the latest supply chain attack, an unknown threat actor has created a malicious Python package that appears to be a software development kit (SDK) for a well-known security...
FBI: Criminals Using BEC Attacks to Scavenge Food Shipments
Threat actors have typically used business email compromise (BEC) attacks to steal money from unwary organizations in recent years. But in a new twist, cybercriminals are using them to...
Chinese APT Group MirrorFace Interferes in Japanese Elections
The Chinese APT group MirrorFace attempted to influence the elections for the Japanese House of Representatives this year, an investigation has revealed.According to researchers at European IT security vendor...
Iran-Backed Charming Kitten APT Eyes Kinetic Ops, Kidnapping
State-sponsored advanced persistent threat (APT) Charming Kitten (aka TA453), which is purportedly linked to the Islamic Revolutionary Guard Corps (IRGC), has updated its phishing techniques, and is using malware and more confrontational...
MTTR “not a viable metric” for complex software system reliability and security
Mean time to resolve (MTTR) isn’t a viable metric for measuring the reliability or security of complex software systems and should be replaced by other, more trustworthy options. That’s...
Raydium is attacked, loses $2M
Solana-based decentralized finance protocol Raydium has suffered an exploit, according to a statement from the developer. An initial investigation by the team revealed that the attacker took over the...