Hackers weaponize Shellter red teaming tool to spread infostealers

Hackers are abusing the legitimate red teaming tool Shellter to spread stealer malware after a licensed copy was leaked. Elastic Security Labs has identified several malware campaigns using the commercial AV/EDR evasion tool SHELLTER. The tool was originally built for legitimate red team operations, however, threat actors have now adopted it to bypass security measures […]

Let Them Eat Recipes for Cake: Why Consciousness Never Will Be Code

Security professionals are intimately familiar with the tension between formalization and practice. We can document every protocol, codify every procedure, and automate every response, yet still observe the art of security requires something more. Thin…

CA Tesla on Autopilot in Another “Veered” Crash

My oh my how the reporting has suddenly changed. Police don’t even use the word Autopilot anymore. And they seem to brush off Tesla design failures like they’re obvious. The driver veered from the highway’s left lane for “unknown reasons,” …

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

Microsoft released Patch Tuesday security updates for July 2025, which addressed 130 flaws, including one a Microsoft SQL Server zero-day. Microsoft Patch Tuesday security updates for July 2025 addressed 130 vulnerabilities in Windows and Windows Components, Office and Office Components, .NET and Visual Studio, Azure, Teams, Hyper-V, Windows BitLocker, Microsoft Edge (Chromium-based), and the Windows […]

Iran to register all civilian drones amid spiraling situation

Iran will soon implement a comprehensive registration system for all drones, both imported and domestically produced, to prevent misuse and enhance national security, according to a senior member of the Iranian Parliament’s National Security and Forei…

Red Light, Green Light: Endpoint Security Edition

Managing endpoints can be as unpredictable as directing traffic on a busy street. Learn how color-coding cybersecurity measures can help with control, coordination, and compliance. The current threat landscape is tricky to navigate. Not only do users w…