Apr 18, 2024NewsroomIncident Response / Cyber Espionage
Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015.
Cisco Talos said its...
Apr 18, 2024NewsroomMobile Security / Malware
A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by...
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However,...
Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack
Zerto, a Hewlett Packard Enterprise company, can help you detect...
Apr 18, 2024NewsroomContainer Security / Cryptocurrency
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage...
Apr 18, 2024NewsroomMalvertising / Endpoint Security
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to...
Apr 17, 2024NewsroomRansomware / Cyber Espionage
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including...
Apr 17, 2024NewsroomVulnerability / Web Application Firewall
Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient...