Category: EN

More .well-known Scans, (Thu, Oct 2nd)

I have been writing about the “.well-known” directory a few times before. Recently, about attackers hiding webshells [1], and before that, about the purpose of the directory and why you should set up a “/.well-known/security.txt” file. But I noticed something…

Confucius Shifts from Document Stealers to Python Backdoors

The Confucius cyber-espionage group has shifted its tactics from document-focused stealers to Python-based backdoors like AnonDoor This article has been indexed from www.infosecurity-magazine.com Read the original article: Confucius Shifts from Document Stealers to Python Backdoors

Amazon Prime Day 2025: The Dark Side of Deals

Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals,…

Confucius Espionage: From Stealer to Backdoor

FortiGuard Labs has uncovered a shift in the tactics of threat actor Confucius, from stealers to Python backdoors, highlighting advanced techniques used in South Asian cyber espionage. Read more.        This article has been indexed from Fortinet Threat Research Blog…

The Spectrum of Google Product Alternatives

  It is becoming increasingly evident that as digital technologies are woven deeper into our everyday lives, questions about how personal data is collected, used, and protected are increasingly at the forefront of public discussion.  There is no greater symbol…

Project Zero Exposes Apple ASLR Bypass via NSDictionary Serialization Flaw

  Google Project Zero has uncovered a sophisticated technique for bypassing Address Space Layout Randomization (ASLR) protections on Apple devices, targeting a fundamental issue in Apple’s serialization framework. Security researcher Jann Horn described how deterministic behaviors in NSKeyedArchiver and NSKeyedUnarchiver…