Malware Families Adapting To COM Hijacking Technique For Persistence
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a…
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a…
A critical security flaw identified as CVE-2024-21762 has been discovered in Fortinet’s FortiOS and FortiProxy secure web gateway systems, potentially impacting around 150,000 devices worldwide.…
Microsoft has disclosed that Russian government hackers, identified as the group Midnight Blizzard, have successfully infiltrated its corporate email systems and stolen source codes. The…
GitLab has announced the release of updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms. These updates address critical vulnerabilities that could…
The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia’s ‘Personas’ application. Fast forwarding to 2022,…
CrowdStrike announced its acquisition of Flow Security, the industry’s first cloud-native data runtime security solution. This move positions CrowdStrike as a leader in modern cloud…
The end-of-life for Talos rules support for two versions of the widespread intrusion detection and prevention system Snort has been declared. Effective immediately, the rule…
Federal Bureau of Investigation (FBI) has published its annual Internet Crime Report for 2023, highlighting a significant 22% increase in losses due to cybercrime, amounting…
Company Open Sources FHE Libraries to Build Privacy-Preserving Blockchain and AI Applications for the First Time. An investment has been secured to bring Fully Homomorphic…
TA4903 is a financially motivated cybercriminal threat actor who impersonates both US government institutions and private businesses across a wide range of industries. The actor…
ArubaOS-Switch belongs to Aruba Networks and it’s a subsidiary of HPE (Hewlett Packard Enterprise). It helps centralize network management, and besides this, it also develops…
Cisco has disclosed a critical vulnerability in the SAML authentication process of its Cisco Secure Client software. This vulnerability could potentially allow unauthenticated, remote attackers…