Recent Blogs
🧛♀️ Brace yourselves, brave souls! The haunted season has returned, and with it, an all-new cybersecurity adventure—Halloween 2024: Return to Haunted Hollow. The sinister spirits of cyberspace awai...
3 hours ago24Views
3likes
2Comments
As we celebrate Cybersecurity Results Month, it's time to recognize the organizations and individuals who have shown exceptional dedication to learning and defending against emerging threats, buildin...
22 hours ago22Views
2likes
1Comment
Organizing engaging, informative, and enjoyable cybersecurity events like Swisscom's Hacktober event doesn't have to be daunting. With strategic groundwork and relevant, interactive challenges, you c...
3 days ago84Views
5likes
2Comments
CVE-2024-5910 (Palo Alto Expedition) - Defensive
Identify signs of exploitation in event logs and extract indicators of compromise
CVE-2024-5910 (Palo Alto Expedition) - Offensive
Use publicly ...
4 days ago18Views
4likes
0Comments
5 MIN READ
CVE-2024-43572 - 7.8 - Microsoft Management Console Remote Code Execution Vulnerability
Top of the list for patching should be a vulnerability in the Microsoft Management Console. While the CVSS sc...
7 days ago56Views
4likes
2Comments
2 MIN READ
When you think of a “cozy bear”, you might think of Winnie the Pooh or a faux fur throw by the fire, not a criminal hacker group that’s been active since 2008.
There was an intrusion to TeamViewer,...
7 days ago128Views
9likes
4Comments
Earlier this week I attended a Cyber Drill in London, it taught me a lot about the power of community in cybersecurity
12 days ago60Views
2likes
1Comment
In this article, we’ll examine CVE-2024-1086, a recently discovered privilege escalation vulnerability affecting various Linux distributions.
13 days ago32Views
2likes
0Comments
You may have heard all the hype about the latest Linux RCE that was supposed to be released on the 6th October. It got leaked and released early! At the actual time of release, there was no active pa...
18 days ago51Views
3likes
1Comment
In 2023, Swisscom’s Hacktober event brought together colleagues and partners from across Switzerland in a fun, engaging, and meaningful month-long learning experience that emphasized cybersecurity.
20 days ago129Views
6likes
2Comments
1 MIN READ
On the 15th of July, 2024, Trend Micro released a piece of research following a threat actor named Void Banshee. Void Banshee was observed in May 2024 running a kill chain to deploy the Atlantida Inf...
27 days ago25Views
2likes
0Comments
What is CVE-2024-3094?
Recently, a critical security problem, known as CVE-2024-3094, was found in the XZ Utils library. XZ Utils is a set of open-source command-line tools and libraries for lossle...
27 days ago70Views
2likes
0Comments
CVE-2024-30051 is a zero-day vulnerability discovered in the Windows Desktop Window Manager (DWM) Core Library. Patched as part of the Microsoft patch Tuesday releases, this vulnerability has been ob...
29 days ago50Views
3likes
1Comment
While scheduling a Team Sim exercise in the Immersive Labs platform is very straightforward, I’m sharing a list of recommendations and tips for making sure your exercise goes the extra mile:
1. Def...
2 months ago83Views
4likes
6Comments
4 MIN READ
CVE-2024-43491 - 9.8 - Microsoft Windows Update Remote Code Execution Vulnerability
Kev Breen, Senior Director Threat Research, Immersive Labs
Top of the list for patches this month is a CVE in t...
2 months ago41Views
3likes
0Comments
Peach Sandstorm is a suspected Iranian state-sponsored threat actor that primarily targets organizations in the satellite, communications equipment, oil and gas, and federal and state government sect...
2 months ago54Views
3likes
1Comment
The essence of cyber threat intelligence
CTI involves understanding the who, what, why, and how of cyber threats. It's about transforming data into actionable intelligence, helping organizations an...
2 months ago61Views
4likes
3Comments
3 MIN READ
CVE-2024-38189 - 8.8 - Microsoft Project Remote Code Execution Vulnerability
One of 6 CVEs being actively exploited in the wild with Microsoft saying “Exploitation Detected” CVE-2024-38189 impacts...
2 months ago19Views
2likes
0Comments
As more organizations adopt and integrate this new technology, the risk of cybersecurity breaches grows. Large Language Models (LLMs), such as OpenAI’s ChatGPT and Google’s Gemini models can be malic...
2 months ago16Views
0likes
0Comments
3 MIN READ
CVE-2024-38080: Windows Hyper-V Elevation of Privilege Vulnerability (CVSS 7.8)
Kev Breen, Senior Director Threat Research, Immersive Labs
There is very little information available about this vu...
4 months ago23Views
0likes
0Comments