Tag: Cybersecurity

CrackedCantil Dropper Delivers Numerous Malware

CrackedCantil is a unique dropper malware sample that operates with a wide…

Stephanie Adlam

New FritzFrog Botnet Sample Exploits Log4Shell and PwnKit

Researchers detected a new sample of FritzFrog malware, that is known for…

Stephanie Adlam

White Phoenix Decryptor by CyberArk Updated With Web Interface

CyberArk has released an online version of a file decryptor. This is…

Stephanie Adlam

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch for a…

Stephanie Adlam

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release of fixes…

Stephanie Adlam

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security software. This…

Stephanie Adlam

What is a Bootkit? Explanation & Protection Guide

Bootkit is a rather unusual and unspoken, though widely used kind of…

Stephanie Adlam

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called "Kasseika" uses Bring Your Own Vulnerable Driver tactics…

Stephanie Adlam

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an auth bypass…

Stephanie Adlam

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in outdated Atlassian…

Stephanie Adlam

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks to fix…

Stephanie Adlam

LockBit Ransomware Uses Resume Word Files to Spread

A recent investigation by ASEC reveals the new tactics of an infamous…

Stephanie Adlam