Infostealers Crash Course: A Tradecraft Tuesday Recap
If a threat actor launches a ransomware, extortion, or identity theft attack, the odds are that infostealers—and the credentials they’ve compromised—are behind it. Infostealers have…
If a threat actor launches a ransomware, extortion, or identity theft attack, the odds are that infostealers—and the credentials they’ve compromised—are behind it. Infostealers have…
A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls (NGFW) to establish persistent footholds within enterprise environments. Each case…
Cyberattacks are constantly evolving. Does your security awareness training keep up? Most businesses have some form of security awareness training (SAT), but traditional SAT hasn’t…
As Macs keep growing in popularity with businesses of all types and sizes, they’ve also started catching the eye of hackers. An increased focus by…
Ravie LakshmananMar 12, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to…
Lateral movement is one of the most common attack tactics that attackers use once they’re inside an organization. Leveraging lateral movement techniques allows attackers to…
Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android…
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that an authentication bypass vulnerability patched in Ivanti Endpoint Manager (EPM) last month is now…
In 2023, Huntress Managed Endpoint Detection and Response (EDR) conducted an assessment to detect exposed passwords across all of our managed endpoints and found that…
Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities. VBR is…
Ravie LakshmananMar 12, 2026Vulnerability / Malware Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after…
Defensive strategies “It is virtually impossible to instill sophisticated levels of knowledge for every user of technology to be able to correctly identify malicious communications,”…