Author: wordpress

Bypassing AVs and EDRs With New Command-Line Obfuscation Technique

Researchers have uncovered advanced command-line obfuscation methods that allow attackers to bypass detection systems such as antivirus (AV) and endpoint detection and response (EDR) platforms.  The techniques, detailed in a comprehensive study released on March 24, 2025, exploit parsing inconsistencies…

Lumma Stealer – Tracking distribution channels

During incident response activities, our GERT team discovered Lumma Stealer in a customer’s infrastructure. Our experts conducted an investigation and analyzed its distribution scheme in detail. This article has been indexed from Securelist Read the original article: Lumma Stealer –…

Zero Trust Architecture – A Step-by-Step Guide for CISOs

Zero Trust Architecture (ZTA) has emerged as a critical security framework for organizations facing sophisticated threats from both external and internal vectors. In today’s rapidly evolving digital landscape, traditional security perimeters have dissolved as cloud adoption accelerates and remote work…

Linux 6.15-rc3 Released With Fix for Multiple Kernel Fixes

Linus Torvalds has announced the availability of the third release candidate for Linux kernel 6.15, continuing the development cycle with a collection of incremental improvements and bug fixes across numerous subsystems.  This update brings stability enhancements while maintaining the regular…

5 Reasons Device Management Isn’t Device Trust​

The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same…