Tag: EN

Debugging DNS response times with tshark, (Fri, Jan 2nd)

One of my holiday projects was to redo and optimize part of my home network. One of my homelab servers failed in November. I had only thrown the replacement in the rack to get going, but some cleanup was needed. In…

South Africa Warns of Cybercrime Surge Amid Festive Season

  South Africa is experiencing a sudden and deeply concerning rise in cybercrime this holiday season, with consumers and businesses being warned to prepare for more aggressive attacks on digital banking, mobile applications and online services.  Surge in festive-season attacks The…

Cyber Briefing: 2026.01.02

ClickFix scams scale, Zoom Stealer hits millions, MongoBleed exploited, major data breaches surface, ESA hacked, big M&A, and arrests unfold. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.02

The Kimwolf Botnet is Stalking Your Local Network

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a broader awareness of the threat. The…

Best of 2025: NIST Launches Updated Incident Response Guide

The National Institute of Standards and Technology (NIST) has released a long-awaited update to its incident response guidance: Special Publication 800-61 Revision 3 (SP 800-61r3). This new version, titled “Incident Response Recommendations and Considerations for Cybersecurity Risk Management,” aligns closely…

RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment

CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the critical React2Shell vulnerability. Analysis of exposed command-and-control logs spanning March through December 2025 demonstrates how threat actors swiftly adapted attack…

Google Tasks Feature Exploited in New Sophisticated Phishing Campaign

Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own application infrastructure to bypass enterprise email security controls. Attackers sent deceptive messages from noreply-application-integration@google.com, marking a critical shift in how threat…