No menu items!
No menu items!
More

    News

    Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    Jan 23, 2025Ravie LakshmananPhishing / Malware Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver...

    Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    Jan 23, 2025Ravie LakshmananFirmware Security / Vulnerability An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known...

    Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

    Jan 23, 2025Ravie LakshmananThreat Intelligence / Data Breach An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective...

    SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation

    Jan 23, 2025Ravie LakshmananVulnerability / Network Security SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access (SMA) 1000 Series...

    How to Eliminate Identity-Based Threats

    Despite significant investments in advanced technologies and employee training programs, credential and user-based attacks remain alarmingly prevalent, accounting for 50-80% of enterprise breaches,....

    QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features

    Jan 23, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat...

    Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

    Jan 23, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit...

    TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

    Jan 23, 2025Ravie LakshmananCloud Security / Cryptojacking Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting...

    Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

    Jan 22, 2025Ravie LakshmananCybersecurity / National Security The new Trump administration has terminated all memberships of advisory committees that report to the Department of...

    Latest articles

    spot_imgspot_img