Critical Jenkins vulnerability (CVE-2024-23897) poses severe RCE threat, exposing organizations to remote code execution risks in CI/CD pipelines.
Stay informed about critical vulnerabilities in Ivanti Connect Secure VPN and Policy Secure appliances exploited by UNC5221 since December 2023.
Stay vigilant against emerging cyber threats. FBI and CISA uncover Androxgh0st malware - explore tactics and strategies to strengthen your network defenses.
This threat bulletin dives into the resurgence of the Bandook remote access trojan (RAT), offering a nuanced perspective on its historical evolution.
In this threat bulletin, we unravel the nuances of DLL hijacking, exploring not only its intricacies but also strategies to fortify our defenses.
In this threat bulletin, we delve into the recent activities of the sophisticated Cloud Atlas group, shedding light on their advanced methodologies.
This threat bulletin gives insight into the malware PikaBot, a highly sophisticated loader that emerged in early 2023, including its distribution techniques.
Get an outline of MrAnon stealer malware, its evolution, potential threats & possible ways of improving Security Information and Event Management (SIEM) Systems
Look into the structure, functions, and possible system performance impacts of HRSERV.DLL, a very important Dynamic Link Library file in Windows OS.
This threat bulletin provides an overview of the OwnCloud vulnerability, its consequences, and possible mitigation measures.
Look into the new Android spyware called Kamran which recently emerged in the Gilgit-Baltista region, that targets people who speak Urdu.
In this threat bulletin, let's look at the signature tactics, techniques, and procedures (TTPs) of GootLoader malware and dive into the new ways it gets around
Take a look at the new malware threat, SeroXen RAT, which is a remote access trojan that’s been discovered, and discuss its implications for security.
This paper examines the characteristics of ExelaStealer, the potential danger vectors connected to it, and offers mitigation strategies to lessen its effects.
Explore ToddyCat APT: Cyberespionage, Threats, & Defenses. Learn about their tactics, IOCs, and how to safeguard your organization.
Stay informed about the latest malware threat EvilProxy, its evolution, SIEM rule updates, IOCs, and protective measures in this comprehensive report.
BunnyLoader: Powerful C/C++ malware loader for cybercriminals, evading detection with fileless loading. Get insights on its dangerous capabilities.
Explore evolving cyber threats: EvilBamboo's tactics targeting Taiwanese, Tibetan, and Uyghur communities exposed. Learn more.
Discover how to protect against BBTok banking trojans in Latin America. Analyzing threats, the latest changes, and mitigation strategies.
Explore HijackLoader virus traits, dangers, security tips, and the latest attack vectors and updates in this comprehensive study.
This threat bulletin gives insight into the ongoing Blister malware threats, evasion tactics, and strategies for enhanced defense.
Upgraded KmsdBot malware targets IoT devices, signaling a concerning evolution in cyber threats. Organizations respond with heightened cybersecurity measures.
Discover Microsoft's findings on advanced BlackCat ransomware variant ALPHV using Impacket and RemCom for effective lateral movement & remote code execution.
Check out the bulletin update on JanelaRAT: Targeted financial malware in LATAM evading detection using DLL side-loading.
Look into the Powerful Linux threat with stealth and reverse shell capabilities. Impacting South Korean systems, its GitHub debut sparked widespread attacks
AVrecon, a potent Linux virus, orchestrates a vast botnet of 70,000+ SOHO routers for bandwidth theft and illicit proxy services, empowering cybercriminals.
Beware the HotRat malware, a dangerous variant of AsyncRAT, spreading via pirated software downloads. Safeguard your system now
Discover WormGPT, a potent cybercrime AI tool automating the creation of deceptive emails, fueling successful phishing and BEC attacks.
Ransomware attacks plague businesses, with Microsoft's Response team uncovering alarming velocity and destruction of BlackByte 2.0 ransomware.
Discover critical SQL injection flaws in Gentoo Soko, a popular Go software module, which was exposed in March 2023 in this insightful threat bulletin.
Learn about Mockingjay process injection— an advanced technique evading security with threat actors leveraging DLLs & RWX permissions in Windows executables.
Vidar malware operators adopt IP rotation, Moldovan & Russian providers to evade detection. Discover the evolving threat in this bulletin.
High-risk vulnerability discovered in Microsoft Visual Studio installer allows malicious actors to distribute dangerous extensions undetected.
Explore the evolving cybercrime tactics with Sphynx strain of BlackCat ransomware in this insightful threat bulletin.
Look into GobRAT, an Advanced Linux RAT targeting Japanese routers, exploits router vulnerabilities & impersonates Apache daemon for stealthy infections.
Learn about MichaelKors RaaS, targeting Linux and VMware ESXi systems, in this revealing threat bulletin.
This threat bulletin gives insight into Greatness, a new Phishing-as-a-service platform which targets corporate customers of the Microsoft 365 cloud service
This threat bulletin gives insight into the Cactus ransomware, which uses known flaws in VPN hardware to get early access to the networks of well-known companies
This threat bulletin gives insight into the malware toolkit Decoy Dog, identified by the cybersecurity organization Infoblox which uses smart evasive strategies.
This threat bulletin gives insight into the outdated WordPress plugin that lets threat actors covertly backdoor websites
This threat bulletin gives insight into the python based hacking tool Legion, used by threat actors to penetrate internet services for exploitation.
This threat bulletin gives insight into the DoS assault that interrupted NPM and caused users to receive the "Service Unavailable" error message
This threat bulletin provides insight into the malware AlienFox, where attackers collect API keys and secrets from well-known services
This threat bulletin gives insight into ShellBot, a DDoS Bot malware written in Perl and uses IRC protocols for connection
This threat bulletin gives insight into a recent Go-based botnet HinataBot, which specializes in initiating DDoS assaults and preys on Linux-based servers
This threat bulletin gives insight into BATLOADER malware that utilizes google advertisements to convey optional payloads like Vidar stealer & Ursnif
This threat bulletin gives insight into alert raised on threat actors actively exploiting a two-year-old VMware Exsi vulnerability to perform ExsiArgs ransomware attacks.
This threat bulletin gives insight into APT38 BlueNoroff, a threat group targeting majorly on financial institutions and their attack methodologies
This threat bulletin gives insight into Qakbot malware, an attacker group majorly using HTML smuggling as their attack pattern, identified by Talos researchers
This threat bulletin gives insight into the Cuba ransomware attack group upon whom an advisory was issued by FBI and security agencies
This threat bulletin gives insight into Redigo Malware detected by the Nautilus research team from Aqua security and the preventive measures to be taken
This threat bulletin gives insight into the Hive threat ransomware group, who targeted more than 1300 companies acquiring 100 million USD approximately
This threat bulletin gives insight into the threat group DEV-0569, finding new ways to deliver royal ransomware upon which MSTC has published a blog
This threat bulletin gives insight into the new version of IcexLoader malware which was actively used in phishing campaigns, its detection & preventive measures
This threat bulletin gives insight into a Ransomware group, Daixin team, that has been targeting organizations since June 2022 & its prevention
This threat bulletin gives insight into the multiple high to low-severity vulnerabilities seen in Mozilla products and their prevention
This threat bulletin gives insight into a new attack framework and malware Insekt discovered by the researchers of Cisco's Talos along with preventive measures
This threat bulletin gives insight into the critical vulnerabilities seen in multiple Fortinet products along with the preventative measures to be followed
This threat bulletin gives insight into the various Zero-day vulnerabilities found in Microsoft Exchange Servers and ways to mitigate & detect them
This threat bulletin gives insight into the exploitation of code injection vulnerability in the user portal and web admin of Sophos firewall and its prevention
This threat bulletin gives insight into the high-severity vulnerabilities discovered in Zoom which can cause unauthorized disruptions & the preventive measures
This threat bulletin gives insight into the newly discovered malware Shikitega that actively targets endpoint devices running on Linux operating systems
This threat bulletin gives insight into the Zero-day vulnerability identified in chrome and chromium based browsers like Microsoft Edge and ways to prevent them
This threat bulletin gives insight into the Remote Code Execution Vulnerability, a critical vulnerability found in GitLab, & its preventative measures
This threat bulletin gives insight into Zeppelin Ransomware, a RaaS, that targets various organizations, and how to detect them
This threat bulletin gives insight into a rapidly evolving malware Rapperbot upon which Fortinet had published a blog and on ways to detect them
This threat bulletin gives insight into Lockbit 3.0 Ransomware, found by the security researchers of SentinelOne, and ways to detect them
This threat bulletin gives insight into HavanaCrypt, a ransomware that poses itself as a Google software update, along with the required prevention protocols
This threat bulletin gives insight into Google Chrome Zero-day vulnerability that can lead to RCE (Remote Code Execution), & how to safeguard yourself.
This threat bulletin gives insight into the return of a major MaaS, Raccoon Stealer, & the preventive measures that can be taken to protect yourself against it.
This threat bulletin gives insight into the preventive measures that can be taken to address the vulnerability of arbitrary code execution in Splunk Enterprise.