Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so ...

New Tickler Malware Used to Backdoor US Government, Defense Organizations

APT33 used the new Tickler malware to infiltrate government and defense organizations in the US and the UAE. The group, ...

Buffer Overflow Flaw in TP-Link Routers Opens Door to RCE

A critical vulnerability, CVE-2024-42815, with a CVSS score of 9.8, has been discovered in TP-Link RE365 V1_180213 ...

US Election-Themed Phishing Scams Rely on Fake Donation Sites

The domain actsblue[.]com is posing as the legitimate actblue[.]com, a platform for Democratic Party donations. The ...

North Korean Hackers Target Developers with Malicious npm Packages

Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, ...

SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments

A comprehensive guide authored by Dean Parsons, SANS Certified Instructor and CEO / Principal Consultant of ICS Defense ...

New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads

Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is ...

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data ...

1 44 45 46 47 48 49 50 51 52 53 54 667