The Week in Cybersecurity

August 18, 2022

The Week in Cybersecurity: Cybercrime growth outpaces the security industry

This week: Evidence has surfaced of cybercrime’s fast-paced growth in 2022, a new Google Chrome zero-day vulnerability is being exploited, and more.
August 15, 2022

The Week in Cybersecurity: MFA shortcomings paved the way for Cisco breach

A breach of Cisco hinged on a compromise of an employee’s Google account using "exhaustion" to trick the user into passing an MFA token to attackers.
August 5, 2022

The Week in Cybersecurity: Meet Manjusaka, 'the Chinese sibling of Silver and Cobalt Strike'

This week: a new Chinese offensive framework may be abused by threat actors, hackers steal $190 million from Nomad Token Bridge, and more. 
July 28, 2022

The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware

This week: Microsoft alleges an Austrian consultancy, DSIRF, is actually a malicious actor dubbed KNOTWEED and suspected of authoring and selling the Subzero malware for use in attacks by malicious actors. Also: new malware-infested apps turn up in the Google Play store, and more.  
July 21, 2022

The Week in Cybersecurity: SolarWinds attackers tap Google Drive, malware spreads via Play Store apps

The Week in Cybersecurity highlights: An APT group is using Dropbox and Google Drive to cover up attacks, and malware is spreading via Play Store apps.
July 15, 2022

The Week in Cybersecurity: Chips hit by 'Retbleed', journalists the chosen target of APTs

This week: a new attack known as ‘Retbleed’ impacts microprocessors, journalists are becoming desirable targets for cybercriminals, and more.
July 8, 2022

The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

This week: fallout from another supply chain attack involving malicious NPM modules. Also: Microsoft backtracks on a pledge to disable Office macros. 

SUBSCRIBE

Sign up now to receive notifications for the ReversingLabs Blog

Request a DEMO

Request a live demo today for a walkthrough of how ReversingLabs detects and analyzes more hidden threats, built to evade security controls—and how we do it faster than anyone else.

REQUEST A DEMO