Saturday, October 4 2025

News Centre

NEWS ROUNDUP – 21st August 2025

21/08/2025

🔍 Digital Forensics & Incident Response Citizen Lab reveals widespread VPN app security flaws: Nearly two dozen Android VPN apps contain shared code and weak encryption-risks extend beyond traditional endpoints. (SecurityWeek) FreeVPN.One Chrome extension caught screenshotting user activity: Over 100K […]

NEWS ROUNDUP – 19th August 2025

19/08/2025

🔍 Digital Forensics & Incident Response Insights Citizen Lab highlights VPN apps with shared code flaws and weak encryption: Numerous mobile VPNs expose users to decryption and replay risks; highlights the need for mobile forensic readiness across app ecosystems. (SecurityWeek) […]

NEWS ROUNDUP – 17th August 2025

17/08/2025

🔍 Digital Forensics & Incident Response Insights Emerging cloud vulnerability exposure trends (SecurityWeek): Businesses are seeing a sharp uptick in zero-day weaponization in cloud services-emphasizing enhanced telemetry and threat-hunting readiness. New LLM-enabled incident response framework (ArXiv): A retrieval-augmented generative (RAG) […]

NEWS ROUNDUP – 15th August 2025

15/08/2025

🔍 Digital Forensics & Incident Response Insights BadCam turns Linux webcams into persistent BadUSB threats: Eclypsium’s DEF CON exposé shows how webcam firmware can be maliciously reflashed, teaching experts to expand DFIR to USB‑peripheral forensics. Deep dive & containment guidance […]

NEWS ROUNDUP – 13th August 2025

13/08/2025

🔍 Digital Forensics & Incident Response Insights BadCam turns Linux webcams into persistent BadUSB tools: Eclypsium’s DEF CON research shows certain webcams can be reflashed for keystroke injection and persistence-expanding DFIR scope to peripheral firmware and chain-of-custody checks. (SecurityWeek) Research […]

NEWS ROUNDUP – 11th August 2025

11/08/2025

🔍 Digital Forensics & Incident Response Insights BadCam: weaponizing Linux webcams via BadUSB for persistence: Eclypsium researchers show how firmware on common Lenovo-branded webcams can be reflashed to survive reboots and OS reinstalls-raising DFIR stakes around peripheral imaging and chain-of-custody. […]

NEWS ROUNDUP – 9th August 2025

09/08/2025

🔍 Digital Forensics & Incident Response Insights Logpoint publishes detection advisory for LameHug AI malware: This AI-driven malware leverages a live Large Language Model for real-time command generation-Logpoint outlines Sigma-based hunt logic to detect it. Security Affairs breaks down LameHug […]

NEWS ROUNDUP – 7th August 2025

07/08/2025

🔍 Digital Forensics & Incident Response Insights Logpoint publishes detection advisory for AI‑powered LameHug malware: This groundbreaking LLM‑enabled malware doesn’t use prewritten commands-it asks the AI how to craft attacks in real time. Use of Sigma rules and IoC feeds […]

NEWS ROUNDUP – 5th August 2025

05/08/2025

Digital Forensics & Incident Response Talos IR confirms ransomware can seize full network control within 24-48 hours, urging rapid log access and live IR readiness. Talos report CERT‑UA reveals AI-powered “LameHug” malware linked to APT28, auto-generating Windows commands via LLM; DFIR […]