Gamaredon Phishing Campaign Exploits WinRAR Vulnerability to Target Government Agencies

Cybersecurity researchers have uncovered a sophisticated phishing campaign orchestrated by the notorious Gamaredon threat group, specifically targeting government entities through exploitation of a critical WinRAR vulnerability. The attack leverages CVE-2025-8088, a path traversal vulnerability in the popular file compression software,…

Review: The Wireless Cookbook

The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who learn through building, experimenting, and breaking things to understand how they…

Is it Time to Put Your SIEM on a Diet?

As data volumes and alert fatigue overwhelm traditional SIEM systems, security leaders are rethinking their approach. Discover strategies to streamline your SIEM, reduce costs, and improve threat detection efficiency through smarter data ingestion, AI-driven analytics, and cloud-native security architectures. The…

Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C

Continuous investigation on the Water Saci campaign reveals innovative email-based C&C system, multi-vector persistence, and real-time command capabilities that allow attackers to orchestrate coordinated botnet operations, gather detailed campaign intelligence, and dynamically control malware activity across multiple infected machines. This…

Innovative Strategies for NHI Security

How Secure Are Your Non-Human Identities in the Cloud? Where technology continuously evolves, how confident are you in your Non-Human Identities (NHIs) within cloud environments? These NHIs, essentially machine identities, serve as critical components in modern cybersecurity frameworks. Their management…