Steganography stories
Attackers abuse Deno runtime to deploy fileless malware
Last month
#
edr
#
cybersecurity
#
keylogging
Hackers are abusing the trusted Deno JavaScript runtime to run fileless CastleRAT malware solely in memory and evade endpoint defences.
Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows
Last month
#
storage
#
endpoint protection
#
phishing
A stealthy BlackSanta malware campaign is hijacking CVs and HR hiring flows to kill EDR tools at kernel level and exfiltrate data.
Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows
Last month
#
storage
#
phishing
#
hcm
A stealthy BlackSanta malware spree is hijacking HR recruitment workflows, killing endpoint defence tools and exfiltrating sensitive data.
Phishing kits & steganography drive new wave of email threats
Fri, 14th Nov 2025
#
malware
#
data protection
#
phishing
Cybersecurity experts warn of rising email threats as phishing kits Tycoon 2FA and Cephas evolve, using steganography and code obfuscation to evade detection.
Malware complexity soars 127% as older defences miss threats
Fri, 8th Aug 2025
#
malware
#
advanced persistent threat protection
#
ai security
Malware complexity has surged 127% as legacy defences miss threats, revealing one in fourteen 'safe' files was actually malicious, OPSWAT reports.
Malicious memes: How cybercriminals use humour to spread malware
Thu, 22nd May 2025
#
malware
#
phishing
#
advanced persistent threat protection
Cybercriminals exploit viral memes to spread malware and phishing attacks, using humour to bypass defences and target millions online in Australia and beyond.
Secure Web Gateways cannot protect you from phishing attacks
Wed, 25th Sep 2024
#
casb
#
sase
#
cybersecurity
Secure Web Gateways fall short against modern phishing attacks, highlighting the need for browser-native security solutions to protect enterprises.
Hiding in plain sight – How attackers conceal malware in everyday web resources
Fri, 13th Sep 2024
#
malware
#
cybersecurity
#
software development
Cyber attackers are concealing malware in everyday web resources like images, WebAssembly, and JavaScript, evading Secure Web Gateways, researchers at SquareX reveal.
Data loss prevention: Why digital images should not be overlooked
Tue, 8th Oct 2019
#
dlp
#
clearswift
#
opinion
Digital images are increasingly being used as mechanisms for cyber-attacks. What can organisations to minimise risks and mitigate against this advanced threat?.