Microsoft Monthly Security Update (April 2024)
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Low RiskSpoofing Windows High RiskSecurity Restriction Bypass Remote Code Execution...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Low RiskSpoofing Windows High RiskSecurity Restriction Bypass Remote Code Execution...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
LayerSlider has released updates to address a critical vulnerability (CVE-2024-2879) affecting their LayerSlider plugin for WordPress. The vulnerability has a...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cisco has released updates addressing multiple high severity vulnerabilities (CVE-2024-20311, CVE-2024-20314, CVE-2024-20307, CVE-2024-20308, CVE-2024-20259, CVE-2024-20303) affecting their IOS and IOS...
Security researchers have disclosed a critical vulnerability (CVE-2024-3094) in XZ Utils used in Linux distributions. The vulnerability has a Common...
Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known...
Security researchers found a new version of the Vultur banking trojan for Android that includes more advanced remote control capabilities...
AT&T has finally confirmed it is impacted by a data breach affecting 73 million current and former customers after initially...
Today, Red Hat warned users to immediately stop using systems running Fedora development and experimental versions because of a backdoor found...
An infostealer malware campaign has collected millions of logins from users of various gaming websites, including players that use cheats,...
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
In late January 2024, the ThreatDown Managed Detection and Response (MDR) team found and stopped a three-month long malware campaign...
It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious...
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Malware loaders (also known as droppers or downloaders) are a popular commodity in the criminal underground. Their primary function is...
In early 2024, a large K-12 school district partnered with ThreatDown MDR to strengthen its cybersecurity posture. Shortly after onboarding,...
A new type of malware is being used by ransomware gangs in their attacks, and its name is PikaBot. A...
February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw...
The Python Package Index (PyPI) has temporarily suspended user registration and the creation of new projects to deal with an...
Cisco has shared a set of recommendations for customers to mitigate password-spraying attacks that have been targeting Remote Access VPN...
If your job involves keeping applications or data secure, you know how important penetration testing can be in identifying potential...
A vulnerability in the wall command of the util-linux package that is part of the Linux operating system could allow an unprivileged...