APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit.
Zscaler ThreatLabz said it o… Continue reading APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

Posted in Uncategorized

The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related to those incidents which employ DLL sideloading and Cobalt Strike Beacon delivery. Continue reading The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

Why boards must prioritize non-human identity governance

Boards of Directors (BoDs) do three things exceptionally well when cyber is framed correctly. They set risk appetite, they allocate capital, and they demand evidence that the business can withstand disruption without losing momentum. Why cyber keeps be… Continue reading Why boards must prioritize non-human identity governance

Open-source attacks move through normal development workflows

Software development relies on a steady flow of third-party code, automated updates, and fast release cycles. That environment has made the software supply chain a routine point of entry for attackers, with malicious activity blending into normal build… Continue reading Open-source attacks move through normal development workflows

Product showcase: 2FAS Auth – Free, open-source 2FA for iOS

Online accounts usually rely on a password, but passwords alone can be weak if they’re reused, easily guessed, or stolen. Two-factor authentication (2FA) adds a second layer of verification, usually a six-digit code generated by an app on your phone. 2… Continue reading Product showcase: 2FAS Auth – Free, open-source 2FA for iOS