Category: EN

Rethinking Security Data Management with AI-Native Pipelines

In this blog, you’ll learn why legacy pipelines fail modern SOC needs, how AI-native pipelines cut manual work, and how security teams gain cost savings, resilience, and faster threat response with adaptive, context-aware data management. The post Rethinking Security Data…

MostereRAT Deployed AnyDesk/TightVNC for Covert Full Access

FortiGuard Labs uncovers MostereRAT’s use of phishing, EPL code, and remote access tools like AnyDesk and TightVNC to evade defenses and seize full system control.        This article has been indexed from Fortinet Threat Research Blog Read the original article:…

The Great NPM Heist – September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…

New Claude Feature Turns Into a Hacker’s Playground

Anthropic’s new Claude file tool boosts productivity but exposes users to prompt injection attacks and potential data leaks. The post New Claude Feature Turns Into a Hacker’s Playground appeared first on eSecurity Planet. This article has been indexed from eSecurity…

AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Security researchers have recently observed a surge in sophisticated fileless malware campaigns targeting enterprise environments. AsyncRAT, a powerful Remote Access Trojan, leverages legitimate system tools to execute malicious payloads entirely in memory, effectively sidestepping traditional disk-based defenses. Emergence of this…