Cybersecurity Blog
Palo Alto Updates Remediation for Max-Critical Firewall Bug
The vulnerability, tracked as CVE-2024-3400, has a CVSS score of 10 out of 10, and can allow an unauthenticated threat ...
US Post Office Phishing Sites Get as Much Traffic as the Real One
Security researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic ...
Analysis of Native Process CLR Hosting Used by AgentTesla
The initial infection vector is a Word document that downloads and executes a 64-bit Rust-compiled binary. This binary ...
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has ...
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against ...
Thousands of Qlik Sense Servers Open to Cactus Ransomware
Nearly five months after security researchers warned of the Cactus ransomware group leveraging a set of three ...
FBI: Fraudsters using fake online dating verification apps to scam lovers
Cybercriminals are taking advantage of people’s fears about online dating by getting them to download fake ...
Bogus npm Packages Used to Trick Software Developers into Installing Malware
Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software ...