Category: EN

Usage of “passwd” Command in DShield Honeypots, (Fri, May 30th)

DShield honeypots [1] receive different types of attack traffic and the volume of that traffic can change over time. I've been collecting data from a half dozen honeypots for a little over a year to make comparisons. This data includes: …

Windows Defender Enhancements for Advanced Threat Mitigation

In the rapidly evolving cybersecurity landscape, Microsoft has doubled down on enhancing its flagship endpoint protection platform, Microsoft Defender for Endpoint (MDE), with advanced capabilities designed to combat sophisticated threats. As ransomware, zero-day exploits, and AI-driven attacks surge, organizations demand…

Detecting Lateral Movement in Windows-Based Network Infrastructures

As cyberattacks become increasingly sophisticated, detecting lateral movement the techniques adversaries use to navigate networks after initial compromise, has become a critical focus for cybersecurity teams. In 2025, organizations face escalating risks from attackers exploiting legitimate Windows services like Remote…

Effective Patch Management Strategies for Windows Operating Systems

Microsoft’s May 2025 Patch Tuesday update addressed five actively exploited vulnerabilities, highlighting the urgent need for organizations to adopt effective patch management strategies for Windows. The exploited flaws, which have affected Windows 10, Windows 11, and Windows Server releases since…

Lumma Infostealer – Down but Not Out?

Key Findings: The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure. Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual. There seems…

How to choose and set up a mobile VPN for an iPhone

Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems. This article has been indexed from Search Security Resources and…

Security by Design: Building Full-Stack Applications With DevSecOps

Building a full-stack application with Angular (frontend) and Node.js (backend) demands a holistic security approach. Security by design means baking in security from the architecture stage and throughout development, rather than as an afterthought. DevSecOps extends DevOps by integrating security…

Protecting Windows Servers from Ransomware Attack Vectors

In the ever-evolving landscape of cybersecurity threats, protecting Windows servers from ransomware has become increasingly critical as these attacks continue to surge alarmingly. Ransomware attacks have increased by 435% since 2020, with organizations facing increasingly sophisticated attack methods. As these…