Tagged articles
5 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 29, 2026 · Information Security

North Korean Hackers Weaponize Excel Files to Breach Pharmaceutical Companies

North Korean state‑backed group Kimsuky delivered a multi‑stage malware campaign against prescription‑drug manufacturers by disguising a Windows shortcut as an Excel document, using hidden PowerShell, JavaScript, and Dropbox C2 to stealthily steal sensitive data, and the report outlines detection indicators and mitigation steps.

Dropbox C2Excel LNK malwareKimsuky
0 likes · 6 min read
North Korean Hackers Weaponize Excel Files to Breach Pharmaceutical Companies
Ops Community
Ops Community
Aug 23, 2025 · Information Security

Top 10 Linux Security Threats in 2025 Every Ops Engineer Must Know

This 2025 Linux security threat report breaks down the ten most critical risks—ranging from supply‑chain poisoning to AI‑driven APT attacks—offering real‑world case studies and actionable, step‑by‑step mitigation strategies for Linux operations teams.

Container SecurityLinux securityOperations
0 likes · 14 min read
Top 10 Linux Security Threats in 2025 Every Ops Engineer Must Know
MaGe Linux Operations
MaGe Linux Operations
Oct 28, 2022 · Information Security

Hidden Malware in Fake GitHub PoCs: Researchers Find 4,893 Malicious Repos

Researchers from the Leiden Institute of Advanced Computer Science analyzed over 47,000 GitHub repositories, uncovering that many fake proof‑of‑concept exploits conceal malware, with nearly 5,000 repositories deemed malicious and detailed case studies revealing hidden trojans, Cobalt Strike tools, and stealthy information stealers.

GitHubThreat analysismalware
0 likes · 6 min read
Hidden Malware in Fake GitHub PoCs: Researchers Find 4,893 Malicious Repos
Open Source Linux
Open Source Linux
Oct 9, 2022 · Information Security

What Is a DDoS Attack? Understanding Types, Motives, and Trends

This article explains the fundamentals of Distributed Denial of Service attacks, covering their definition, key characteristics, common motivations, classification by technique and protocol layer, current attack statistics, target industries, and emerging trends shaping the future of DDoS threats.

Cyber AttacksDDoSDistributed Denial of Service
0 likes · 14 min read
What Is a DDoS Attack? Understanding Types, Motives, and Trends
Tencent Cloud Developer
Tencent Cloud Developer
Jun 13, 2018 · Information Security

Analysis of DDoS Attack Trends in the First Half of 2018

In the first half of 2018 DDoS attacks surged, with IoT‑based SSDP and newly dominant Memcached reflection amplifications reaching 1.7 Tbps, gaming becoming the top‑targeted sector, SYN and HTTP floods rising, attack infrastructure shifting abroad, and automated, low‑cost services enabling teenage operators, prompting recommendations for high‑bandwidth cloud and BGP defenses.

Attack TrendsDDoSThreat analysis
0 likes · 13 min read
Analysis of DDoS Attack Trends in the First Half of 2018