September 2025

Archived: All My Technical Articles from VinCSS

I’ve recently received numerous feedback indicating that many of my past blog posts from my time at VinCSS are either inaccessible, hard to ...

Sp123 30 Sept, 2025

CrowdStrike Boosts SOC Detection Content with Correlation Rule Template Discovery Dashboard

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fla...

Sp123 30 Sept, 2025

Vulnerability in CivetWeb software

Improper Neutralization of NUL Character vulnerability (CVE-2025-9648) has been found in CivetWeb software. Introduction to Malware Binary...

Sp123 29 Sept, 2025

A week in security (September 22 – September 28)

Last week on Malwarebytes Labs: Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using c...

Sp123 29 Sept, 2025

APT Group Profiles – Larva-24005

Summary   In May 2025, AhnLab SEcurity intelligence Center (ASEC) discovered an operation linked to the Kimsuky group while tracking malware...

Sp123 29 Sept, 2025

Sandfly 5.5.4 - North Korean Rootkit Detection Enhancements

Sandfly 5.5.4 has enhancements to further target the recently released suspected North Korean stealth rootkit on Linux. Additionally, we hav...

Sp123 28 Sept, 2025

북한 Lazarus(라자루스) 가상화폐(암호화폐)탈취를 위해 만들어진 악성코드-config(.)py(2025.8.7)

오늘은 북한의 정찰총국 산하 김수키(Kimsuky)와 같이 있는 해킹 조직인 북한 Lazarus(라자루스) 가상화폐(암호화폐)탈취를 위해 만들어진 악성코드 config(.)py에 대해 알아보겠습니다.파일명:config(.)py사이즈:2,030 Byte...

Sp123 28 Sept, 2025

Company that sells software for monitoring sex offenders, terrorists, and hackers was hacked

Mikael Thalen reports: A company that sells spyware that monitors individuals on parole and probation had its data leaked to a cybercrime fo...

Sp123 27 Sept, 2025

London nurseries hit by hackers, data on 8,000 children stolen

James Pearson reports: Cybercriminals have stolen data on over 8,000 children attending nurseries in London operated by childcare provider K...

Sp123 27 Sept, 2025

CISA Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices

This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 25-03: Identify and ...

Sp123 26 Sept, 2025

HeartCrypt’s wholesale impersonation effort

How the notorious Packer-as-a-Service operation built itself into a hydra Introduction to Malware Binary Triage (IMBT) Course Looking to ...

Sp123 26 Sept, 2025

Why Logging Out of Facebook Could Save You From Scams and Stop Meta’s Relentless Tracking

Staying logged into Facebook might seem convenient, but it opens the door to sophisticated tracking, dangerous exploits and even attacks ...

Sp123 26 Sept, 2025

Fusion Fireside #12: Behavioural Modelling and the Future of Fraud Prevention with Patrick Bours

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 25 Sept, 2025

Countdown to DPDP Rules: What to Expect from the Final DPDP Rules

The wait is almost over. The final Digital Personal Data Protection (DPDP) Rules are just days away, marking the next big step after the ena...

Sp123 25 Sept, 2025

Building a High-Performance Incident Response Team: Key Roles, Responsibilities, and Structure

Learn how to build a high-performance incident response team, including key roles, responsibilities, and the ideal team structure for fast a...

Sp123 25 Sept, 2025

Why Regional and Cooperative Banks Can No Longer Rely on Legacy VPNs

Virtual Private Networks (VPNs) have been the go-to solution for securing remote access to banking systems for decades. They created encrypt...

Sp123 24 Sept, 2025

Migrating from VMware to Proxmox: What You Need to Know

Migrating from VMware to Proxmox is not an easy undertaking and requires serious consideration. Let’s walk through migrating from VMware to ...

Sp123 24 Sept, 2025

From LNK to RAT: Deep Dive into the LNK Malware Infection Chain

Attackers keep availing the use of Windows shortcut (.LNK) files to deliver malware. These LNK files normally used as shortcuts to programs...

Sp123 24 Sept, 2025

What to expect from iPhone 17?

Apple has officially launched its new iPhone 17 lineup . The new devices that will be hitting the shelves later this month will come in fou...

Sp123 24 Sept, 2025

Stop Fraudsters at the Front Door with Device and Behavioural Intelligence

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 23 Sept, 2025

LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

Deploying Web Application and API Protection (WAAP) systems is crucial for bolstering cybersecurity defenses. Akamai reported 108 billion AP...

Sp123 23 Sept, 2025

A week in security (September 15 – September 21)

Last week on Malwarebytes Labs: Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using c...

Sp123 22 Sept, 2025

BlockBlasters: Infected Steam game downloads malware disguised as patch

A 2D platformer game called BlockBlasters has recently started showing signs of malicious activity after a patch release on August 30. While...

Sp123 22 Sept, 2025