White Phoenix Decryptor by CyberArk Updated With Web Interface
CyberArk has released an online version of a file decryptor. This is…
GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk
In a new security update, GitLab has issued a patch for a…
4 Junos OS Vulnerabilities Fixed, Update Now
In the latest security bulletin, Juniper Networks announced the release of fixes…
Panda Security Driver Vulnerabilities Uncovered in APT Simulation
Security researchers discovered critical security driver vulnerabilities in Panda Security software. This…
What is a Bootkit? Explanation & Protection Guide
Bootkit is a rather unusual and unspoken, though widely used kind of…
Kasseika Ransomware Exploits Vulnerable Antivirus Drivers
A new ransomware called "Kasseika" uses Bring Your Own Vulnerable Driver tactics…
GoAnywhere MFT Auth Bypass Vulnerability Discovered
The fest of vulnerabilities in enterprise software continues with an auth bypass…
Confluence RCE Vulnerability Under Massive Exploitation
Researchers are seeing attempts to exploit a critical vulnerability in outdated Atlassian…
2 Citrix RCE Under Active Exploitation, CISA Notifies
CISA has given a timeframe of one to three weeks to fix…
LockBit Ransomware Uses Resume Word Files to Spread
A recent investigation by ASEC reveals the new tactics of an infamous…
Over 178,000 SonicWall Firewalls are Vulnerable to DoS and RCE
Recent research uncovers a significant portion of SonicWall firewall instances being susceptible…
9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II
A chain of 9 vulnerabilities in UEFI’s Preboot Execution Environment (PXE), dubbed…