Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a […]
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a […]
The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted features, the
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether
Kaspersky Managed Detection and Response service (MDR) provides round-the-clock monitoring and threat detection, based on Kaspersky technologies and expertise. The
A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024.
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come
Ireland’s Commission for Regulation of Utilities (CRU), the nation’s independent regulator of energy and water, is proposing strict new rules
A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an
A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to
Amazon Simple Email Service (SES) announces that Outbound customers can now specify a Mail Manager archive resource as an additional
AWS Network Firewall now offers automated domain lists and insights, a feature that enhances visibility into network traffic and simplifies
CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries,
A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in phishing attacks
Fortinet has reinforced its FortiAnalyzer security analytics and log management platform with capabilities that enhance enterprise threat detection and automate
Amazon Elastic Container Service (Amazon ECS) now supports CPU limits of up to 192 vCPU for ECS tasks deployed on
AWS Database Migration Service Serverless (AWS DMSS) now supports premigration assessments for replications . A premigration assessment evaluates the source
Amazon Relational Database Service (Amazon RDS) for MySQL now supports MySQL minor versions 8.0.41 and 8.4.4. We recommend that you
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns