A brief daily summary of what is important in information security. The podcast is published every w
Fake BSOD Delivered by Malicious Python Script Xavier found an odd malicious Python script that di
DShield SIEM Docker Updates Interested in learning more about the attacks hitting your honeypot?
An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure
Microsoft Patch Tuesday Microsoft released patches for 55 vulnerabilities. Three of them are actag
Reminder: 7-Zip MoW The MoW must be added to any files extracted from ZIP or other compound file f
SSL 2.0 Turns 30 This Sunday SSL was created in February 1995. However, back in 2005, only a year
The Unbreakable Multi-Layer Anti-Debugging System Xavier found a nice Python script that included
Phishing via com- prefix domains Every day, attackers are registering a few hunder domain names st
Some Updates to Our Data Feeds We made some updates to the documentation for our data feeds, and a
Crypto Wallet Scam YouTube spam messages leak private keys to crypto wallets. However, these keys
To Simulate or Replicate: Crafting Cyber Ranges Automating the creation of cyber ranges. This will
PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary]
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF doc
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHe
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access bro
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against u
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall state