Featured

What is Clickjacking?

On the heels of an urgent warning being issued for hundreds of millions of Chrome, Edge, and Safari users, our ethical hackers have compiled a foundational guide for how to defend against clickjacking in 2025.

February 18 - Blog

Weaponizing ANSI Escape Sequences

Discover the hidden dangers of ANSI escape sequences in terminal applications. Learn how these vulnerabilities have been weaponized, as revealed at DEFCON by the security researcher STÖK.

February 14 - Blog

What is Clickjacking?

On the heels of an urgent warning being issued for hundreds of millions of Chrome, Edge, and Safari users, our ethical hackers have compiled a foundational guide for how to defend against clickjacking in 2025.

February 12 - Blog

Top Cybersecurity Threats in 2025 (So Far)

Learn about the top cybersecurity threats in 2025 (so far) and what steps your organization can take to prevent or mitigate them.

February 11 - Blog

Social Media App RedNote Vulnerable to MiTM Attacks

This article explores recent security vulnerabilities found in RedNote, a rising social media app, and examines the risks of data breaches and interception due to inadequate security measures.

February 06 - Blog

Attacking the SWIFT Banking System

Discover the top strategies attackers have used to target the SWIFT banking system and how financial institutions can enhance security to prevent fraud with SWIFT Payment Controls (PCS).

February 04 - Blog

Blackwood APT Uses AiTM Attacks to Target Software Updates

Blackwood APT uses AiTM attacks that are set to target software updates. Is your organization prepared? Learn more in today's blog.

January 30 - Blog

CVE Discovery: Aquabot Botnet Targeting Vulnerable Mitel Phones

This blog details the process and discovery of three Remote Authenticated Command Injection vulnerabilities (CVE-2024-37569, CVE-2024-37570, CVE-2024-41710) in different firmware versions of Mitel SIP Phones. 

January 29 - Blog

Corporate Mutiny Cybersecurity Risks and How to Handle Them

Discover how corporate mutiny can threaten your organization’s cybersecurity. Learn to spot early signs, prevent insider attacks, and address leadership issues to protect against cyber risks.

January 28 - Blog

Samy Kamkar at DEFCON 2024: Hacking With Energy For 2025

Samy Kamkar’s DEFCON 2024 revelations on energy-based attacks exploit light, sound, and EMI for espionage. Learn how these groundbreaking side-channel techniques work.

January 27 - Blog

APT, Mustang Panda, STOLEN PENCIL: Threat Actor Names Demystified

Demystify threat actor names (and common cybersecurity naming conventions) in today's article.

January 23 - Blog

TeleKopye: A Fraud Toolkit For Low-Skilled Attackers

Learn how TeleKopye, a phishing toolkit, simplifies scams for low-skilled attackers targeting online marketplaces and booking platforms like Airbnb, using fake forms and advanced tools to steal data.

January 17 - Blog

The Security Risk of Technical Debt and How to Manage It

Technical Debt can escalate cybersecurity risks and leave gaps in security posture and reduce productivity. Learn how to identify and mitigate it to safeguard your organization from tech debt.

1

Packetlabs Company Logo
    • Toronto | HQ
    • 401 Bay Street, Suite 1600
    • Toronto, Ontario, Canada
    • M5H 2Y4
    • San Francisco | HQ
    • 580 California Street, 12th floor
    • San Francisco, CA, USA
    • 94104