Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows
In a twist of fate that underscores both the power and inherent transparency of endpoint detection and response (EDR) solutions....
Read more →In a twist of fate that underscores both the power and inherent transparency of endpoint detection and response (EDR) solutions....
Read more →A sophisticated espionage campaign leveraging a previously unknown malware strain dubbed GONEPOSTAL, attributed to the notorious Russian state-sponsored group KTA007,...
Read more →Sophos has released an important security advisory addressing a critical authentication bypass vulnerability in its AP6 Series Wireless Points. Attackers who...
Read more →Microsoft has released a warning about two serious security flaws in Windows BitLocker that could allow attackers to gain elevated...
Read more →A critical security vulnerability has been discovered in SAP NetWeaver AS Java Deploy Service that enables authenticated attackers to execute arbitrary code...
Read more →GitHub repositories for malware delivery through sophisticated weaponized LNK files, according to recent analysis by S2W’s Threat Intelligence Center, TALON....
Read more →Microsoft is rolling out AI-powered actions in File Explorer, allowing users to interact with files more deeply without leaving the folder...
Read more →Microsoft has released its September 2025 Patch Tuesday update, addressing a total of 81 security vulnerabilities across its product portfolio....
Read more →Zoom has released an urgent security update for its Windows client and Workplace platform to address multiple flaws, including a...
Read more →Ivanti released Security Advisory for Endpoint Manager versions 2024 SU3 and 2022 SU8, detailing two high‐severity flaws (CVE-2025-9712 and CVE-2025-9872)....
Read more →Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute...
Read more →Ivanti on September 9 released a security advisory detailing six medium and five high severity vulnerabilities impacting Ivanti Connect Secure, Policy Secure, ZTA Gateways,...
Read more →