Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tycoon2FA New Evasion Technique for 2025

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past endpoints and detection systems. These include using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection. This blog takes a closer look at these methods to better understand how this kit is evolving and what defenders should be aware of.

The malware dating guide: Understanding the types of malware on NPM

The Node ecosystem is built on a foundation of trust — trust that the packages you npm install are doing what they say they do. But that trust is often misplaced. Over the past year, we’ve seen a disturbing trend: a rising number of malicious packages published to npm, often hiding in plain sight. Some are crude proof-of-concepts (PoCs) by researchers, others are carefully crafted backdoors.

Shadow AI: A New Insider Risk for Cybersecurity Teams to Tackle Now

Disclaimer: Don't get me wrong, I love using generative AI daily for research and writing. This is about how other users could be using it when they don't know what they don't know and are accidental in their actions to hurt the organization where they work. Shadow IT has always lived in the background of organizations' environments with unapproved apps, rogue cloud services, and forgotten BYOD systems. Like all technology, the Shadow IT ecology is evolving.

64% of Australian Organizations Hit by Ransomware Were Forced to Halt Operations

Illumio’s recent Global Cost of Ransomware Study found that 64% of Australian companies hit by ransomware had to shut down operations as a result. Additionally, 43% of these organizations reported a significant loss of revenue, and 39% lost customers as a result of an attack. Most respondents indicated that reputational damage has overtaken regulatory fees as the most costly effect of a ransomware attack.

From endpoint to XDR: Operationalize Microsoft Defender for Endpoint data in Elastic Security

Enhance your threat detection, investigation, and response by integrating Microsoft Defender for Endpoint data with Elastic Security. Many security teams often find it difficult to detect and respond to threats because of fragmented visibility and isolated endpoint data. This challenge led to the development of extended detection and response (XDR), which integrates endpoint insights with contextualized data from networks, cloud environments, and identity systems.

tj-actions/changed-files with Falco Actions

A compromise (CVE-2025-30066) was discovered in the popular GitHub Action tj-actions/changed-files on March 14, 2025. It impacted tens of thousands of repositories that use this action to track file changes. This blog will explain how Falco Actions can easily be integrated into your workflows to help detect this CI/CD attack and provide in-depth visibility. Falco Actions is an open-source project that monitors your CI/CD workflows for potential threats in real time, leveraging the OSS tool Falco.

What is GitHub? Top GitHub Security Best Practices for Securing your Repository

Did you know that over 90% of modern software applications rely on open-source code? With millions of developers using GitHub daily, the platform has become a goldmine for hackers looking to exploit misconfigured repositories. In the past, incidents occurred where thousands of developers lost access to their projects when attackers wiped out GitHub accounts using simple security loopholes. GitHub is a powerful platform, but if you don’t secure your repository, you invite hackers to your front door.

Digital Forensics for Insider Threats: Leveraging in IT Environments

Security breaches originating from within organizations represent some of the most damaging incidents facing IT teams today. While external threats receive significant attention, insider activities often cause more severe impacts due to the privileged access these individuals already possess. Digital forensics has proven essential in identifying and mitigating these insider risks before they develop into major incidents by enabling teams to analyze data from multiple digital sources.

How to Build a HIPAA-Compliant Asset Inventory in Healthcare System

Healthcare asset management plays a vital role to protect sensitive patient data and maintain HIPAA compliance. The Office for Civil Rights reports that organizations don’t know where their electronic protected health information (ePHI) exists within their systems. This highlights an urgent need to track inventory and update systems properly. Let’s explore how healthcare organizations can build an asset inventory system that works.