On the heels of an urgent warning being issued for hundreds of millions of Chrome, Edge, and Safari users, our ethical hackers have compiled a foundational guide for how to defend against clickjacking in 2025.
February 18 - Blog
Discover the hidden dangers of ANSI escape sequences in terminal applications. Learn how these vulnerabilities have been weaponized, as revealed at DEFCON by the security researcher STÖK.
February 14 - Blog
On the heels of an urgent warning being issued for hundreds of millions of Chrome, Edge, and Safari users, our ethical hackers have compiled a foundational guide for how to defend against clickjacking in 2025.
February 12 - Blog
Learn about the top cybersecurity threats in 2025 (so far) and what steps your organization can take to prevent or mitigate them.
February 11 - Blog
This article explores recent security vulnerabilities found in RedNote, a rising social media app, and examines the risks of data breaches and interception due to inadequate security measures.
February 06 - Blog
Discover the top strategies attackers have used to target the SWIFT banking system and how financial institutions can enhance security to prevent fraud with SWIFT Payment Controls (PCS).
February 04 - Blog
Blackwood APT uses AiTM attacks that are set to target software updates. Is your organization prepared? Learn more in today's blog.
January 30 - Blog
This blog details the process and discovery of three Remote Authenticated Command Injection vulnerabilities (CVE-2024-37569, CVE-2024-37570, CVE-2024-41710) in different firmware versions of Mitel SIP Phones.
January 29 - Blog
Discover how corporate mutiny can threaten your organization’s cybersecurity. Learn to spot early signs, prevent insider attacks, and address leadership issues to protect against cyber risks.
January 28 - Blog
Samy Kamkar’s DEFCON 2024 revelations on energy-based attacks exploit light, sound, and EMI for espionage. Learn how these groundbreaking side-channel techniques work.
January 27 - Blog
Demystify threat actor names (and common cybersecurity naming conventions) in today's article.
January 23 - Blog
Learn how TeleKopye, a phishing toolkit, simplifies scams for low-skilled attackers targeting online marketplaces and booking platforms like Airbnb, using fake forms and advanced tools to steal data.
January 17 - Blog
Technical Debt can escalate cybersecurity risks and leave gaps in security posture and reduce productivity. Learn how to identify and mitigate it to safeguard your organization from tech debt.
1
© 2024 Packetlabs. All rights reserved.