Insights

Latest Xloader Obfuscation Methods and Network Protocol

Introduction Xloader is an information stealing malware family that evolved from Formbook and targets web browsers, email clients, and File Transfer Protocol (FTP) applications. Additionally,...

BSidesSLC 2025 – Considering Cloud Coverage In SIEM/XDR Design

Author, Creator & Presenter: Chris Beckman – Principal Security Engineer at TaxBit Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding...

Panera’s 5.1 Million User Breach: When ‘No Hack’ Becomes a Ransomware Business Model

On January 28, 2026, Panera Bread confirmed what cybersecurity researchers already knew: the company had experienced a "cybersecurity incident." What Panera didn't say: the...

Passkeys vs Bots: Do They Really Solve the Human Verification Problem?

Passkeys authenticate users securely, but they do not prove a user is human. Passkeys replace passwords with device-bound cryptographic authentication. They prevent phishing, credential...

TCP vs UDP: Difference, Examples, Future

Home » TCP vs UDP: Difference, Examples, Future Published: March 31, 2026 Introduction When it comes to sending data over the internet, two main...

Inventors of Quantum Cryptography Win Turing Award

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this...

Trending News

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...

Move fast and save things: A quick guide to recovering a hacked account

Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...