“Please wait, your document is loading.”
That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware.
In the latest ColorTokens Threat Advisory, we tracked how threat actors are not just breaching networks, but embedding themselves deeply, moving laterally, disabling defenses, and stealing data in ways that bypass even modern security controls.
This blog highlights the most urgent stories from the advisory and shares how to stop these attackers before they spread.
Cisco Firewalls and the VPN Entry Point That Refuses to ...
The Voice of Cyber®
Security Awareness
Security Awareness involves educating individuals within an organisation about potential cyber threats, safe online practices, and the importance of maintaining a security-conscious mindset. Security Awareness programs aim to empower employees to recognise and mitigate cybersecurity risks, reducing the likelihood of falling victim to social engineering attacks such as phishing or malware. Effective security awareness efforts encompass regular training sessions, simulated phishing exercises, and the dissemination of relevant information to foster a culture of cybersecurity vigilance.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

An article around how security solutions designed to strengthen defences can inadvertantly contribute to a fragmented cybersecurity landscape, where unifying risk metrics and ...

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware ...

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as ...

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but ...

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual ...
No results found.
In The News
Sort By
- Date
- Title
Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, ...
Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022
Elevation of Privilege (EoP) and Remote Code ...
Starting today, security campaigns are generally available for all GitHub Advanced Security and GitHub Code Security customers to help them take control of their security ...
An analysis of REF8685's abuse of GitHub for C2 to evade defenses.
Elastic Security Labs describes ABYSSWORKER, a malicious driver used with the MEDUSA ransomware attack-chain to disable anti-malware tools.
The first few months of 2025 saw a massive spike in phishing-as-a-service (PhaaS) attacks targeting organizations around the world, with more than a million attacks detected ...
No results found.
Podcasts On Security Awareness




