RedTiger an open source red team toolkit has been repurposed into an infostealer that targets Discord, browsers and crypto wallets. Read the technical analysis, IoCs, detection rules and mitigation guidance.
SonicWall confirmed an unauthorized access to MySonicWall cloud backups affecting all customers. Learn the technical details, risks, detection rules, IR workflow, and remediation checklist for the sonicwall breach.