Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use...
Darcula PhaaS can now auto-generate phishing kits for any brand
The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted...
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations...
New NailaoLocker ransomware used against EU healthcare orgs
A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and...
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler...
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that...
Ireland says there will be no computation without generation
Ireland’s Commission for Regulation of Utilities (CRU), the nation’s independent regulator of energy and water, is proposing strict...
Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability
A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could...
Cisco Secure Email Gateway Email Filter Bypass Vulnerability
A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker...
Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote...
SES Outbound now delivers to Mail Manager Archives
Amazon Simple Email Service (SES) announces that Outbound customers can now specify a Mail Manager archive resource as...
AWS Network Firewall introduces automated domain lists and insights
AWS Network Firewall now offers automated domain lists and insights, a feature that enhances visibility into network traffic...
CISA and FBI: Ghost ransomware breached orgs in 70 countries
CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over...
Phishing attack hides JavaScript using invisible Unicode trick
A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in...
Fortinet speeds threat detection with improved FortiAnalyzer
Fortinet has reinforced its FortiAnalyzer security analytics and log management platform with capabilities that enhance enterprise threat detection...
Amazon ECS increases the CPU limit for ECS tasks to 192 vCPUs
Amazon Elastic Container Service (Amazon ECS) now supports CPU limits of up to 192 vCPU for ECS tasks...
Announcing AWS DMS Serverless comprehensive premigration assessments
AWS Database Migration Service Serverless (AWS DMSS) now supports premigration assessments for replications . A premigration assessment evaluates...
Amazon RDS for MySQL supports new minor versions 8.0.41 and 8.4.4
Amazon Relational Database Service (Amazon RDS) for MySQL now supports MySQL minor versions 8.0.41 and 8.4.4. We recommend...
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727,...
Australian fertility services giant Genea hit by security breach
Genea, one of Australia’s largest fertility services providers, disclosed that unknown attackers breached its network and accessed data stored...