Native American Indian & Service-Disabled Veteran Owned Business
KayDev Tech
  • Home
  • About Us
  • Partners & Clients
  • Product
  • NAICS Codes
  • Services
  • News and Events
  • Contact
Menu
  • Home
  • About Us
  • Partners & Clients
  • Product
  • NAICS Codes
  • Services
  • News and Events
  • Contact

Who We Are

  • Who We Are
  • Who We Are
Contact Us

Recent Posts

  • Careers

Categories

  • Uncategorized

Archives

  • May 2019

RSS Cybersecurity

  • TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns July 1, 2025
    Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is […]
  • New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status July 1, 2025
    A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines. "We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality
  • A New Maturity Model for Browser Security: Closing the Last-Mile Risk July 1, 2025
    Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. […]
  • Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update July 1, 2025
    Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine. "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 […]
  • U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms July 1, 2025
    The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers. The coordinated action saw searches of 21 known or suspected "laptop farms" between June […]
  • Microsoft Removes Password Management from Authenticator App Starting August 2025 July 1, 2025
    Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025. Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure.Over […]
  • U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure June 30, 2025
    U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber attacks from Iranian state-sponsored or affiliated threat actors.  "Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said. "These cyber actors often
  • Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects June 30, 2025
    Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The international effort, codenamed Operation Borrelli was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol […]
  • Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks June 30, 2025
    The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that […]
  • Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories  June 30, 2025
    Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the […]
© 2019 KayDev Technology. All Rights Reserved. Design & SEO By Miss Tweak IT