Cybersecurity Blog
Fake IT Support Sites Push Malicious PowerShell Scripts as Windows Fixes
These sites are promoted through compromised YouTube channels, lending them credibility. One particular error, the ...
End-to-End Secrets Security: Making a Plan to Secure Your Machine Identities
At the heart of every application are secrets. Credentials that allow human-to-machine and machine-to-machine ...
New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems
OpenSSH maintainers have released security updates to contain a critical security flaw that could result in ...
Update: Polyfill.io, BootCDN, Bootcss, Staticfile Attack Traced to one Operator
Researchers found a public GitHub repo where the operators of Polyfill.io accidentally exposed their Cloudflare secret ...
Meet Brain Cipher — The New Ransomware Behind Indonesia’s Data Center Attack
Brain Cipher ransomware has been uploaded to various malware-sharing sites, created using the leaked LockBit 3.0 ...
Threat Actors Actively Exploit D-Link DIR-859 Router Flaw
The flaw, which has a CVSS score of 9.8, allows threat actors to perform path traversal attacks and gain unauthorized ...
Juniper Releases Out-of-Cycle Fix for Max Severity Authentication Bypass Flaw
Juniper Networks has released an emergency update to address a severe vulnerability in Session Smart Router (SSR), ...
Juniper Networks Releases Critical Security Update for Routers
Juniper Networks has released out-of-band security updates to address a critical security flaw that could lead to an ...