CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks

Credit to Author: Peter Girnus| Date: Tue, 04 Feb 2025 00:00:00 +0000

The ZDI team offers an analysis on how CVE-2025-0411, a zero-day vulnerability in 7-Zip, was actively exploited to target Ukrainian organizations in a SmokeLoader campaign involving homoglyph attacks.

Read more

Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

Native Sensors vs. Integrations for XDR Platforms?

Credit to Author: Chris LaFleur| Date: Mon, 03 Feb 2025 00:00:00 +0000

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

Read more

Future of Cybersecurity: Will XDR Absorb SIEM & SOAR?

Credit to Author: Chris LaFleur| Date: Fri, 31 Jan 2025 00:00:00 +0000

XDR is reshaping cybersecurity by unifying and enhancing SIEM and SOAR capabilities into a single platform. It addresses alert fatigue, improves incident correlation, simplifies operations, and enhances efficiency for SOC teams.

Read more

NDR: Not Just a “Nice to Have” Anymore

Credit to Author: Chris LaFleur| Date: Thu, 30 Jan 2025 00:00:00 +0000

Network Detection and Response (NDR) is no longer a ‘nice-to-have’—it’s essential. NDR complements EDR, accelerates incident response, and enhances visibility, making it a critical tool for modern cybersecurity strategies and service providers.

Read more

Lumma Stealer’s GitHub-Based Delivery Explored via Managed Detection and Response

Credit to Author: Buddy Tancio| Date: Thu, 30 Jan 2025 00:00:00 +0000

The Managed XDR team investigated a sophisticated campaign distributing Lumma Stealer through GitHub, where attackers leveraged the platform’s release infrastructure to deliver malware such as SectopRAT, Vidar, and Cobeacon.

Read more

ASRM: A New Pillar for Cyber Insurance Underwriting

Credit to Author: Chris LaFleur| Date: Wed, 29 Jan 2025 00:00:00 +0000

ASRM transforms cyber insurance underwriting by integrating real-time risk assessments, advanced tools (NDR, EDR, Cloud Security, MDR), and proactive mitigation strategies to improve accuracy, reduce claims, and build trust.

Read more

Invisible Prompt Injection: A Threat to AI Security

Credit to Author: Ian Ch Liu| Date: Wed, 22 Jan 2025 00:00:00 +0000

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

Read more