Blog
SUBSCRIBE to
“Hide and Squeak"
Stay Ahead of Threats Worldwide.
Subscribe to Our Weekly Newsletter for the Latest Cybersecurity Insights and Threat Updates
Subscribe to Our Weekly Newsletter for the Latest Cybersecurity Insights and Threat Updates
Oops! Something went wrong while submitting the form.
All articles
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

December 2, 2025
Microsoft to Block Unauthorized Scripts for Enhanced Security
Microsoft Entra ID
Microsoft authentication security
unauthorized scripts blocking
identity and access management
sign-in security

November 15, 2025
How Stolen AWS Credentials Power a Silent Fraud Infrastructure
cloud identity attacks
Amazon SES abuse
cloud fraud campaigns
AWS security risks
identity as perimeter

November 15, 2025
Threat Actor Profile: The API Phantom
API security threats
SonicWall breach
cloud backup compromise
state-sponsored cyber attack
APT threat actors

November 15, 2025
Zero-Day Exploits Target Cisco ISE and Citrix NetScaler
• Cisco ISE zero-day
Citrix NetScaler ADC vulnerability
enterprise network security
in-memory web shell
in-memory web shell

November 15, 2025
CL0P Ransomware Group Allegedly Compromises Entrust via Oracle EBS 0-Day
CL0P ransomware
Oracle E-Business Suite vulnerability
Oracle EBS zero-day
enterprise application security
supply chain cyber attack

October 30, 2025
Baphomet's Black Market Bypass
EDR killer
Baphomet threat actor
endpoint security evasion
kernel-level attacks
BYOVD exploitation

October 30, 2025
If You Are A Developer, You need to see this!
npm security
typosquatting attack
malicious npm packages
software supply chain attacks
developer credential theft

October 30, 2025
LockBit 5.0 Has A New Trick
LockBit ransomware
LockBit 5.0
ChuongDong ransomware
multi-platform ransomware
ESXi ransomware attacks

October 30, 2025
The EDR Killer!
EDR killer
Baphomet threat actor
endpoint defense evasion
kernel-level malware
BYOVD attacks

October 28, 2025
Scan with Caution: How Cybercriminals Are Turning QR Codes into Phishing Traps
QR code phishing
quishing attacks
QR code scams
phishing awareness
mobile security risks

October 23, 2025
Humans Are the First Firewall: Protecting Your Digital Front Door
firewall
human firewall
Cybersecurity Awareness
first line of defense
strong passwords

October 17, 2025
Protecting What Matters Most: Building a Resilient Business (Part 2)
esentry
cybersecurity
Cyber Offense
Resilient Business
Sorry, we couldn’t find any results. Try another search.


.png)
.png)