Apr 05, 2024NewsroomMalware / Endpoint Security
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan.
The starting...
Apr 05, 2024NewsroomAdvanced Persistent Threat
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805,...
Apr 05, 2024NewsroomCyber Espionage / Cybersecurity
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a...
Apr 04, 2024NewsroomPhishing Attack / Malware
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil...
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable...
Apr 04, 2024NewsroomVulnerability / Internet Protocol
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service...
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike...
Apr 04, 2024NewsroomNetwork Security / Vulnerability
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that...
Apr 03, 2024NewsroomMobile Security / Zero Day
Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the...