GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoader
Attacks surged in July 2025 after the threat group updated its process to combine malicious LNK files and a recycled WebDAV technique
The Invisible Half of the Identity Universe Identity used to live in one place – an LDAP directory, an HR system, a single IAM portal. Not anymore. Today, identity is fragmented across SaaS, on-prem, IaaS, PaaS, home-grown, and shadow applications. Each of these environments carries its own accounts, permissions, and authentication flows. Traditional IAM and…
Martin Matishak reports: A deal to reopen the U.S. government would also renew an expired cybersecurity information sharing law until the end of January. The Senate on Sunday advanced legislation to end a weeks-long shutdown stalemate that includes a provision to reauthorize the 2015 Cybersecurity Information Sharing Act through January 30. The law, which incentivizes……
Dysruption Hub reports: Puerto Rico officials say a Thanksgiving-week cyberattack on IT contractor Truenorth Corporation briefly disrupted systems at three major agencies but did not compromise citizen data, even as independent reporting describes a broader ransomware incident. Truenorth Corporation, an IT services firm that runs key systems for multiple Puerto Rico government agencies, was the……
The Iranian nation-state hacking group known as Charming Kitten has been observed deploying a C++ variant of a known malware called BellaCiao. Russian cybersecurity company Kaspersky, which dubbed the new version BellaCPP, said it discovered the artifact as part of a “recent” investigation into a compromised machine in Asia that was also infected with the…
Sania Kozatskyi reports: Cyber specialists of the Defense Intelligence of Ukraine have gained full access to all computers and servers of the self-proclaimed authorities in temporarily occupied Crimea. Sources within the agency reported this to Militarnyi. As part of the operation, they obtained over 100 terabytes of intelligence data, including official correspondence of the so-called “head of……
Wojeski & Company suffered a ransomware attack, and then an insider breach when an employee of a firm hired to investigate the breach inappropriately accessed data. Employees were also transmitting data to external accounts without authorization. To make things even worse, the accounting firm took more than a year to notify those affected. From a……