Cybersecurity Blog
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented ...
18 vulnerabilities in Brocade SANnav
Product description Brocade’s SANnav Management Portal and SANnav Global View empower IT through simplified ...
Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack
Apr 26, 2024NewsroomNetwork Security / Zero Day Palo Alto Networks has shared remediation guidance for a recently ...
Autodesk hosting PDF files used in Microsoft phishing attacks | Netcraft
Autodesk is hosting malicious PDF files that lead phishing attack victims to have their Microsoft login credentials ...
ThreatLocker Raises $115M in Series D Funding
ThreatLocker, an Orlando, FL-based global cybersecurity company that offers a Zero Trust endpoint security solution, ...
Researchers Sinkhole PlugX Malware Server With 2.5 Million Unique IPs
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months ...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical ...
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its ...