chromium-based-browsers-vulnerability

High Severity Vulnerability in Chromium based Browsers

This threat bulletin gives insight into the Zero-day vulnerability identified in chrome and chromium based browsers like Microsoft Edge and ways to prevent them

Read More
gitlab-critical-vulnerability

Critical vulnerability in Gitlab- Remote Code Execution

This threat bulletin gives insight into the Remote Code Execution Vulnerability, a critical vulnerability found in GitLab, & its preventative measures

Read More
zeppelin-ransomware

Zeppelin Ransomware demands ransom in bitcoin

This threat bulletin gives insight into Zeppelin Ransomware, a RaaS, that targets various organizations, and how to detect them

Read More
rapperbot-malware

Rapperbot malware targeting SSH servers

This threat bulletin gives insight into a rapidly evolving malware Rapperbot upon which Fortinet had published a blog and on ways to detect them

Read More
lockbit-3-0-ransomware

Lockbit 3.0 Ransomware found by security researchers

This threat bulletin gives insight into Lockbit 3.0 Ransomware, found by the security researchers of SentinelOne, and ways to detect them

Read More
havanacrypt-ransomware

Havana Crypt Ransomware posed as a Google software update

This threat bulletin gives insight into HavanaCrypt, a ransomware that poses itself as a Google software update, along with the required prevention protocols

Read More
google-chrome-vulnerability

Google Chrome Zero-day Vulnerability

This threat bulletin gives insight into Google Chrome Zero-day vulnerability that can lead to RCE (Remote Code Execution), & how to safeguard yourself.

Read More
raccoon-stealer

Raccoon Stealer back with Version 2.0

This threat bulletin gives insight into the return of a major MaaS, Raccoon Stealer, & the preventive measures that can be taken to protect yourself against it.

Read More
splunk-vulnerability

Arbitrary Code Execution Vulnerability in Splunk Enterprise

This threat bulletin gives insight into the preventive measures that can be taken to address the vulnerability of arbitrary code execution in Splunk Enterprise.

Read More

Get in touch

Send us a Message

Looking for general information or have a specific question. Fill the form below or drop
us a line at susan@positka.com.

Positka uses cookies to provide necessary site functionality and improved experience. By using our website, you agree to our privacy policy.