Vulnerabilities
Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader
We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike ...
Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24
Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives
Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...
3CX Phone System Local Privilege Escalation Vulnerability
Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Recently, we ...
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target
Xi whiz: Versa Networks criticized for swerving the blame ...
Strengthening API Security with AppSentinels Integration in the Strobes Platform
APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post ...
Seeing the Unseen: How Generative AI Elevates Situational Awareness in Cybersecurity
Situational awareness in cybersecurity is hard! And poor situational awareness can be disastrous in cybersecurity. For a CISO, it could mean missing acting on a critical gap in the security program, leading ...
LockBit, RansomHub Lead Ransomware Attacks in July
Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group ...
Enhanced User Access: More Control, More Security with Strobes
At Strobes, we’re redefining how you manage user access with a game-changing upgrade to our role management system. Consider a platform where every user has exactly the permissions they need... The post ...
Miggo Uncovers AWS Load Balancer Security Flaw
Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than ...