Attackers replaced JDownloader installer downloads with malware
If you downloaded the JDownloader installer during the compromise window (May 6-7), you are advised to verify the file. JDownloader is a popular download management…
If you downloaded the JDownloader installer during the compromise window (May 6-7), you are advised to verify the file. JDownloader is a popular download management…
Ravie LakshmananMay 15, 2026Botnet / Threat Intelligence The Russian state-sponsored hacking group known as Turla has transformed its custom backdoor Kazuar into a modular peer-to-peer…
Jaguar Land Rover (JLR) continues to face financial fallout from the devastating 2025 cyber attack on its systems, with sales and profits dropping precipitously during…
Small inefficiencies often show up – a delayed campaign here, inconsistent data there – until they begin to impact customer experience, operational speed, and increasingly,…
SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader…
CVE-2026-42897: Microsoft confirms active exploitation of Exchange Server zero-day Pierluigi Paganini May 15, 2026 Microsoft warned that attackers are exploiting a new Exchange Server zero-day…
Researchers discovered the authentication bypass vulnerability while investigating a prior issue in the same service. Source link
Attackers returned once again to a common target with a massive user base by exploiting a max-severity zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and…
Executive Summary This article examines new obfuscation techniques the Gremlin stealer malware uses to conceal malicious payloads within embedded resources. We analyze a variant protected…
“A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an…
Researchers at Darktrace disclosed a China-linked cyberespionage campaign targeting organizations primarily across the Asia-Pacific and Japan region using an updated version of the FDMTP backdoor…
The U.S. National Institute of Standards and Technology advanced nine digital signature algorithms to the third round of its additional post-quantum cryptography standardization effort, as…