Nov 23, 2023NewsroomVulnerability / Cyber Threat An active malware campaign is leveraging two zero-day vulnerabilities with remote code execut...
Category: Attack
Modern security tools continue to improve in their ability to defend organizations' networks and endpoints against cybercriminals. But the bad a...
Nov 23, 2023NewsroomSoftware Supply Chain Attack A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojan...
Nov 22, 2023NewsroomAuthentication Security / Windows A new research has uncovered multiple vulnerabilities that could be exploited to bypass ...
Nov 22, 2023NewsroomCyber Espionage / Social Engineering North Korean threat actors have been linked to two campaigns in which they masquerade...
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecur...
Nov 22, 2023NewsroomSEO poisoning / Malware Analysis The macOS information stealer known as Atomic is now being delivered to target via a bogu...
Nov 22, 2023NewsroomThreat Analysis / Vulnerability Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a...
Nov 21, 2023NewsroomRansomware-as-a-service The ransomware strain known as Play is now being offered to other threat actors "as a service," ne...
Nov 21, 2023NewsroomMalware Threat / Data Privacy A new variant of the Agent Tesla malware has been observed delivered via a lure file with th...
