My Courses
-

New phishing tool Salty2FA bypasses two-factor authentication
Phishing-as-a-Service (PhaaS) platforms continue to evolve, providing attackers with faster and cheaper methods to infiltrate corporate accounts. Researchers at ANY.RUN have identified a new threat:…
-

Cryptojacking attack using TOR infiltrates misconfigured Docker APIs
Cybersecurity researchers have identified a new variant of a previously disclosed campaign that exploits the TOR network for cryptojacking attacks aimed at exposed Docker APIs….
-

Chinese agents reportedly posed as US congressman to transmit malware
China’s APT41 has been implicated in a sophisticated cyber espionage operation, where they impersonated U.S. Representative John Moolenaar to distribute malicious emails. These emails were…
-

GitHub workflow breaches impact multiple repositories
A supply chain attack known as GhostAction has emerged, allowing threat actors to infiltrate systems and steal sensitive information. This sophisticated attack has particularly targeted…
-

Remote hiring fraud increasing quickly
What if the star engineer that an organisation just hired is actually an attacker in disguise? This scenario is not about phishing; it involves infiltration…
-

MystRodX backdoor uses DNS and ICMP triggers for covert manipulation
Cybersecurity researchers have recently unveiled a sophisticated backdoor known as MystRodX, which is designed to capture sensitive data from compromised systems. Implemented in C++, MystRodX…
-

Can AI agents identify threats that your Security Operations Center overlooks?
A new research project called NetMoniAI demonstrates how AI agents could transform network monitoring and security. Developed by a team at Texas Tech University, the…
-

Iranian cybercriminals compromise over 100 diplomatic email accounts
An Iran-nexus group has been linked to a “coordinated” and “multi-wave” spear-phishing campaign targeting embassies and consulates across Europe and other regions globally. This activity…



