Home Blog Page 28

On the Importance of “Hello” and “Thanks”

In a recent conversation with a Let’s Encrypt subscriber, we asked them to guess how many people work at ISRG, the nonprofit behind Let’s Encrypt (and Prossimo and Divvi Up). Their guess was about 100; they’d overestimated by 72.5 people. We’re a pretty small team, and we get a lot done, but most of that work is entirely remote,...

Revving up to build: Top Down with Matt Nowzari

Matt Nowzari is a software engineer on Elastic’s Search team, shaping how external data flows into Elasticsearch. - Read more

Global SystemBC Botnet Found Active Across 10,000 Infected Systems

SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure - Read more

Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms

Microsoft confirms a Windows bug preventing some PCs from shutting down or hibernating after January 2026 updates. A fix is still pending. The post Windows Shutdown Bug Spreads to Windows 10, Microsoft Confirms appeared first on TechRepublic. - Read more

Kelly Hiscoe Recognized Among CRN 2026 Channel Chiefs for Innovation and Impact

In 2026, security teams are still grappling with the challenges posed by expanding attack surfaces and persistent resource constraints. Together with the rapid onset of AI-driven threats, security leaders are weathering this ‘perfect storm’ by seeking consolidation of their technology stacks – favoring trusted partnerships that truly understand their unique ecosystems.To elevate security partners from mere service providers to...

Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia

Key Points Check Point Research (CPR) has been tracking Amaranth-Dragon, a nexus of APT-41, previously aligned with Chinese interests. The group launched highly targeted cyber-espionage campaigns throughout 2025 against government and law enforcement agencies in Southeast Asia. We observed overlaps between Amaranth-Dragon and APT-41’s arsenal, suggesting a possible connection or shared resources between them. Further analysis of file compilation...

How to Reduce False Positives Using Connected Intelligence

False positives are one of the biggest barriers to effective phishing defense. When security teams are overwhelmed with noisy alerts, real threats hide in plain sight, investigations slow down, and analyst confidence erodes. Reducing false positives is more than tuning detection rules, it requires connected intelligence that brings together human insight, verified threat data, and supervised AI to deliver...

Cofense Report Reveals AI-Powered Phishing Accelerated to One Attack Every 19 Seconds

LEESBURG, Va., February 4, 2026 -- Cofense, the leading provider of intelligence-driven post-perimeter phishing defense, today released its latest threat intelligence report, The New Era of Phishing: Threats Built in the Age of AI, revealing how AI technologies are now central to how threat actors operate, fundamentally transforming the speed, scale, and sophistication of modern phishing attacks.In 2025, Cofense analysts...

Web Traffic Hijacking: When Your Nginx Configuration Turns Malicious

Datadog Security Research has identified an active web traffic hijacking campaign that targets NGINX installations and management panels like Baota (BT). In this post, we provide our analysis of the techniques this campaign uses and share indicators of compromise you can check for in your NGINX configurations. - Read more

Latest article

Why AI, Zero Trust, and modern security require deep visibility

AI. Automation. Zero Trust. They dominate every security strategy document. But there’s a truth sitting underneath all three: none of them...

Samsung MagicINFO Server Multiple Vulnerabilities

Samsung MagicINFO Server Multiple Vulnerabilities MagicINFO User Credential Disclosure (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)NOTE: Samsung mentioned this item may have been fixed with version 21.1090.1, but we were...

Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

Researchers say a vulnerability in Perplexity’s Comet AI browser could expose local files and credentials through malicious calendar invites. The post Perplexity AI Browser Flaw...

Tycoon 2FA Phishing Kit Disrupted by Microsoft, Europol and Partners

Microsoft, Europol, and partners have dismantled the Tycoon 2FA phishing-as-a-service (PhaaS) platform, seizing 330 domains used for credential theft and MFA bypass. This coordinated...