Cybersecurity Blog
Malvertising Campaign Phishes Lowe’s Employees
The fake landing pages closely mimicked the real Lowe’s portal, prompting employees to enter their sales numbers, ...
White House Launches Cybersecurity Hiring Sprint To Help Fill 500,000 Job Openings
The White House has launched a cybersecurity hiring sprint to fill 500,000 job openings, part of a program to address ...
CVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise
The CVE-2024-26581 PoC exploit has been disclosed, posing a risk to Linux systems by allowing root compromise. The flaw ...
Respotter: Open-Source Responder Honeypot
Respotter is an open-source honeypot designed to detect attackers when they launch Responder within your environment. ...
Goffloader: In-Memory Execution, No Disk Required
Praetorian has uncovered GoffLoader, an in-memory execution tool that allows security professionals to run BOF and ...
Use of Predator Spyware Rebounds After a Dip From Biden Sanctions, Researchers Say
Despite facing sanctions, Predator has managed to attract new customers and has been detected in various countries, ...
Infosec Spending to Hit 3-Year Growth Peak, Reach $212B Next Year: Gartner
Global spending on information security is on track to reach nearly $212 billion next year, with a projected 15% ...
Critical Vulnerability Discovered in Progress LoadMaster
Progress Software has alerted users to a critical vulnerability (CVE-2024-7591) in its LoadMaster ADC and load balancer ...