Ivanti Issues Warning on Active Exploitation of Recently Patched Cloud Appliance Vulnerability
Ivanti has disclosed that a recently patched security vulnerability in its Cloud Service Appliance (CSA) is being actively exploited in the wild. The vulnerability, identified...
Cybercriminals Leverage HTTP Headers to Steal Credentials in Widespread Phishing Attacks
Cybersecurity researchers have raised alarms about ongoing phishing campaigns that exploit HTTP headers’ refresh entries to deliver fake email login pages aimed at stealing users’...
Next-Gen Attacks, Same Targets: Safeguarding Your Users’ Identities
FBI and CISA Issue Joint Advisory on Emerging Ransomware Threats On August 29, as part of the ongoing #StopRansomware initiative, the FBI and CISA released...
North Korean Hackers Deploy FudModule Rootkit Using Chrome Zero-Day Exploit
A recently patched security vulnerability in Google Chrome and other Chromium-based browsers was exploited as a zero-day by North Korean hackers in a campaign aimed...
The Importance of Continuous Penetration Testing: What You Need to Know
Continuous Attack Surface Penetration Testing (CASPT): An Overview Continuous Attack Surface Penetration Testing (CASPT) is a proactive security practice that focuses on the ongoing and...
RansomHub Ransomware Group Hits 210 Targets Across Critical Sectors
Threat actors associated with the RansomHub ransomware group have encrypted and stolen data from over 210 victims since the group’s emergence in February 2024, according...
New vulnerabilities in Microsoft apps for macOS might enable hackers to gain unrestricted access.
Eight vulnerabilities have been identified in Microsoft applications for macOS, which could be exploited by attackers to gain elevated privileges or access sensitive data by...
New Cyberattack Targets Chinese-Speaking Businesses Using Cobalt Strike Payloads
Chinese-speaking users are being targeted by a “highly organized and sophisticated attack” campaign that appears to use phishing emails to infect Windows systems with Cobalt...
North Korean Hackers Target Developers Using Malicious npm Packages
Threat actors linked to North Korea have been detected distributing malicious packages on the npm registry, highlighting their “coordinated and relentless” attempts to target developers...
New Malware Disguised as Palo Alto VPN Targets Middle East Users
Cybersecurity researchers have uncovered a new campaign potentially targeting users in the Middle East through malware disguised as Palo Alto Networks’ GlobalProtect VPN tool. According...