LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations

Mei Danowski & Eugenio Benincasa unpack how Chinese firms running attack-defense exercises fuel state-linked offensive cyber operations. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…

OpenSSL 3.2 End Of Life

OpenSSL 3.2 series has reached its End of Life (EOL). As such it will no longer receive publicly available security fixes. This article has been indexed from Blog on OpenSSL Library Read the original article: OpenSSL 3.2 End Of Life

ClickFix Attack Uses Steganography to Hide Malware in Fake Windows Security Update

Cybersecurity researchers at Huntress have uncovered a sophisticated ClickFix campaign that leverages steganography to conceal malicious code within PNG images disguised as Windows Update screens. The attack chain delivers multiple variants of information-stealing malware, including LummaC2 and Rhadamanthys, through a…

Critical Fluent Bit Vulnerabilities Allow Remote Attacks on Cloud Environments

Five newly discovered critical vulnerabilities in Fluent Bit, the open-source log processor embedded in billions of containers, are sending shockwaves through the cloud security community. Oligo Security’s research uncovers attack chains that enable adversaries to bypass authentication, perform path traversal,…