Dirty Frag: The Linux Kernel Vulnerability Every Admin Needs to Know About

We just started applying mitigation for the copy fail and another one is out from the same family. Since we manage Linux servers primarily, this demands immediate attention. A new privilege escalation vulnerability has been disclosed under the name Dirty Frag. This flaw extends the bug class previously seen in the “Dirty Pipe” and “Copy […]

AI-Powered Cyber Attacks in 2026: The Rise of Intelligent and Automated Threats

What Are AI-Powered Cyber Attacks? AI-powered cyber-attacks are an emerging threat in which attackers utilise AI to automate, adapt, and execute attacks in real time. These attacks are not like the traditional cyber threats, which adapt tactics dynamically, but can target multiple systems at once. AI-powered cyber attacks in 2026 are categorised into these four […]

Identifying and Eradicating the Ebury Rootkit

Scenario Our work with a newly onboarded client began with an immediate challenge: an active rootkit infection. At the time of our investigation, official documentation from the FBI and NHTCU had not yet been released, which required us to rely entirely on system forensics to identify the Ebury malware and determine the full extent of […]

Client File Transfer Protocol (FTP) Compromise and Phishing Kit Deployment

Scenario During our regular monitoring, we discovered that a domain hosted on a client’s server was compromised. Attackers created a deep, hidden directory within the site’s file structure to host a fraudulent financial login page. This infrastructure hijacking was used to deploy a phishing kit targeting financial services. By nesting this malicious page within a […]