Powered by Jutsu
Blog
About Us
Contact Us
Privacy Policy
Terms & Conditions
All Right Reserved by Jutsu Inc. | 2024
Author at AgentSOC
Cryptocurrency / Artificial Intelligence A Telegram-hosted “guarantee” marketplace that has been a central hub for a wide spectrum…
Leaked API keys are now a routine incident type for SOC teams, and so are the downstream breaches…
Cloudflare has fixed a security issue in its Automatic Certificate Management Environment (ACME) validation logic that allowed security…
Security researchers have detailed an intrusion campaign aimed at software engineering environments, using a new information-stealing malware dubbed…
The Problem: The Identities Left Behind As environments scale and change, people, vendors, workloads, and systems rotate constantly…
Cybersecurity researchers have uncovered a phishing operation that abuses private messaging on social platforms to deliver malicious binaries,…
A vulnerability has been identified in the widely used binary-parser npm library that, if abused, can lead to…
LastPass is notifying customers about an active phishing campaign masquerading as the password manager, attempting to harvest users’…
A trio of security issues has been identified in mcp-server-git, the official Git Model Context Protocol (MCP) server…
The North Korean threat actors behind the long-running Contagious Interview campaign have now been seen abusing malicious Microsoft…
The threat actor referred to as Silver Fox is now actively targeting India, using phishing emails themed around…
A high-severity MongoDB vulnerability has been identified that enables unauthenticated clients to read uninitialized data from the server…
In December 2024, the popular Ultralytics AI library was compromised and used to deploy malicious code that hijacked…
Cybersecurity researchers have outlined a “sustained and targeted” spear-phishing operation that weaponized more than two dozen npm packages…
A newly disclosed MongoDB security bug is now being actively weaponized, with more than 87,000 internet-facing instances appearing…
From a SOC lens, last week’s activity in 2025 wasn’t dominated by a single headline breach, but by…
From a SOC vantage point, the line between routine technology use and hostile activity is getting thinner. Adversaries…
A critical vulnerability has been identified in LangChain Core that an attacker could abuse to exfiltrate sensitive secrets…
A China-based advanced persistent threat (APT) group has been tied to a focused cyber-espionage operation in which the…
Trust Wallet is urging users to immediately update its Google Chrome extension to the latest release after identifying…