Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Steganography is the art of hiding information inside a seemingly ordinary, legitimate object so that no one suspects anything is hidden. The technique T1027.003 has been around for a long time and is increasingly used by malware authors and threat actors to avoid detection. This involves hiding malicious payloads inside innocent-looking files such as images, audio, or documents. By embedding malware in these files, attackers can bypass traditional security tools that scan for obvious threats.

Detecting Suspicious ESXi Activity Before Ransomware Happens

Cybersecurity teams worldwide have been fighting against ransomware attacks on ESXi infrastructure for years. ESXi is a lightweight, bare-metal hypervisor developed by VMware that allows multiple virtual machines to run on a single physical server. ESXi is widely used in enterprise environments, often hosting virtual machines that support essential services for an entire organization.

Veracode Q2 '25 Product Showcase: The Latest Innovations in Application Security

Ready to see what's new at Veracode? Get a sneak peek at five game-changing features from our latest quarterly customer showcase! We're tackling real-world security challenges to help you save time, cut down risk, and stay ahead of attackers. In this video, you'll see: DAST Essentials AI Login: Say goodbye to clunky scripts! See how our new AI-assisted login automates complex, multi-step login flows for dynamic scanning, saving you hours of manual work.

Beyond PCI and HIPAA: How Feroot Powers Australian Privacy Act (APA) Compliance

Yes—if your website collects data from individuals located in Australia, the Australian Privacy Act (APA) may apply, even if your company is not based there. This law is enforced by the Office of the Australian Information Commissioner (OAIC) and governs how “APP entities” handle personal information—including that collected by websites, apps, scripts, and third-party services.