Recent articles
-
Innovative Malware Loaders: Call Stack Spoofing and GitHub C2
As cybersecurity threats continually evolve, so do the techniques employed by malware loaders to evade detection and gain persistence on…
-
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Cryptojacking has escalated as a significant threat to unprotected database systems. Recently, over 1,500 PostgreSQL instances have been compromised in…
-
Lucid PhaaS Targets Global Organizations with Innovative Smishing Techniques
The landscape of cybercrime continues to evolve with the introduction of phishing-as-a-service (PhaaS) platforms like Lucid. Recently, Lucid has targeted…
-
Apple Faces €150 Million Fine for Discriminatory ATT Practices
The recent fine imposed on Apple by France’s competition authority serves as a stark reminder of the complexities surrounding data…
-
How to Secure Your WordPress Site from Mu-Plugin Threats
Are you aware of the critical vulnerabilities that hackers exploit in WordPress mu-plugins? The alarming rise in cyber threats targeting…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher