Recent articles
-
Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings
The digital landscape is fraught with threats as cybercriminals exploit popular platforms to distribute malware. Recently, cryptocurrency miner and clipper…
-
Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal
Cybersecurity vulnerabilities pose significant threats to cloud infrastructure. Recent findings related to the Amazon EC2 Simple Systems Manager (SSM) Agent…
-
Agentic AI: Transforming SOC with Autonomous Alert Triage
What if your Security Operations Center (SOC) could handle alerts autonomously, reducing analyst fatigue and improving incident response times? The…
-
GIFTEDCROOK: New Cyber Threat Targeting Ukraine Through Malicious Excel Files
As cyber threats escalate, how prepared are organizations to combat sophisticated attacks? Recent reports from the Computer Emergency Response Team…
-
Attackers distributing a miner and the ClipBanker Trojan via SourceForge
In today’s digital landscape, cybercriminals continually innovate, discovering new ways to exploit trusted platforms. Recently, a disturbing trend emerged where…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher