Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Telegram Abused as C2 Channel for New Golang Backdoor

As part of Netskope Threat Labs hunting activities, we came across an IoC being shared by other researchers and decided to take a closer look at it. During the analysis, we discovered that the payload was apparently still under development, but is already fully functional. The malware acts like a backdoor and uses Telegram as its command and control (C2) channel.

Security Bulletin: Fake Reddit Sites and Lumma Stealer

A new campaign distributing the notorious Lumma Stealer malware has been discovered by security analyst Crep1x at Sekoia. Threat actors are utilizing over 80 second-level domains to generate over 1,000 fully qualified domain names impersonating Reddit and WeTransfer. Websites impersonating Reddit feature a fake thread designed to deceive victims into downloading the malware.

Microsoft GCCH vs. Google Public Sector for CMMC

When it comes to overall productivity platforms, collaboration tools, and office suites, the two biggest options dominating the market are the Google G Suite and Microsoft’s Office ecosystem. Whether it’s word processing, team collaboration, IT frameworks, device management, or the entire infrastructure of a business, there’s a pretty good chance one of these two options is going to power the way you operate.

Best Practices For Responding to Privileged Access Requests

Organizations are prioritizing a Privileged Access Management (PAM) strategy to prevent cybercriminals from accessing privileged accounts and conducting malicious activities. A key component of this strategy is securely managing privileged access requests and ensuring that access is granted only when necessary, properly authenticated and monitored in real time.

The Benefits of Integrating PAM With SIEM Solutions

Integrating Privileged Access Management (PAM) with Security Information and Event Management (SIEM) solutions offers many benefits for organizations, including enhanced threat detection, improved visibility, reduced risk of insider threats, simplified compliance and more. Continue reading to learn more about the benefits of integrating PAM with SIEM solutions and best practices for integrating the two.

OSINT Framework: How Open Source Intelligence Powers Cybersecurity

Open Source Intelligence (OSINT) is the backbone of modern cybersecurity investigations, helping analysts and law enforcement uncover threats, assess risks, and gather intelligence from publicly available sources. In this guide, we break down everything you need to know about OSINT, from key frameworks and tools to how it's used in cybersecurity.

Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained

Imagine you’re building a blogging web app using Prisma. You write a simple query to authenticate users based on their provided email and password: Looks harmless, right? But what if an attacker sends password = { "not": "" }? Instead of returning the User object only when email and password match, the query always returns the User when only the provided email matches. This vulnerability is known as operator injection, but it’s more commonly referred to as NoSQL injection.