Cybersecurity Blog
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by ...
Medusa Ransomware Turning Your Files into Stone
This post is also available in: 日本語 (Japanese) Executive Summary Unit 42 Threat Intelligence analysts have noticed an ...
Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP
Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical ...
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
Defense evasion by exploiting CVE-2023-36025 Once the malicious .url file exploiting CVE-2023-36025 is executed, it ...
DreamBus Unleashes Metabase Mayhem With New Exploit Module
Technical Analysis Zscaler ThreatLabz has previously analyzed DreamBus and its modules. Each DreamBus module is an ...
UAE Faces Fresh Plague of Phishing Scams, Poisoned Searches
A recent spate of phishing scams — promoted through counterfeit websites — has prompted warnings from police and local ...
Team Liquid ’s wiki leak exposes 118K users
Team Liquid’s wiki leak exposes 118K users Pierluigi Paganini January 12, 2024 Liquipedia, an online e-sports platform ...
Recovery from cyberattack ‘on the horizon,’ Kansas Supreme Court chief justice says
The Kansas state court system is close to a full recovery from an October ransomware attack that forced officials to use ...