Malicious PuTTY Ads Deliver OysterLoader, Allowing Attackers Full Device and Network Access

The Rhysida ransomware gang has been running a sophisticated malvertising campaign that delivers OysterLoader malware through deceptive search engine advertisements, giving attackers complete access to compromised devices and networks. The Rhysida gang, formerly known as Vice Society before rebranding in…

Uncovering the risks of unmanaged identities

Every organization manages thousands of identities, from admins and developers to service accounts and AI agents. But many of these identities operate in the shadows, untracked and unprotected. These unmanaged identities quietly expand your attack surface, weaken compliance, and threaten…

Cybercriminals Exploit RMM Tools to Target Trucking Firms and Hijack Freight

Cybercriminals are orchestrating sophisticated attacks against trucking and freight companies in elaborate schemes designed to steal cargo shipments worth millions. These threat actors are exploiting the digital transformation of the logistics industry, compromising transportation companies to fraudulently bid on legitimate…

Stytch Alternatives for Passwordless Authentication

Compare the best Stytch alternatives for passwordless authentication after the Twilio acquisition. Developer-first analysis of MojoAuth, SSOJet, Auth0, WorkOS, Supabase Auth and Clerk — features, pricing and integration insights. The post Stytch Alternatives for Passwordless Authentication appeared first on Security…