Rockwell Automation Urges Device Disconnection
Rockwell Automation advises disconnecting unneeded internet-connected devices. Guidance provided to identify and secure exposed assets. Monitoring and applying patches for…
VMware Addresses Critical Vulnerabilities
VMware issued patches for critical vulnerabilities. Exploitation risks include code execution and data breaches. Organizations must apply patches and review…
Fortinet FortiSIEM Faces Critical RCE Vulnerability
Critical vulnerability in Fortinet FortiSIEM allows remote code execution. Researchers found insufficient input sanitization in the LicenseUploadServlet. Organizations must update…
Hijack Loader Malware Expands Stealth Tactics
Hijack Loader malware enhances its anti-evasion tactics. ANY.RUN detects malware using advanced YARA rules. Modular payloads complicate detection and remediation…
Memcyco Finds Brands Lacking in Fraud Protection
Memcyco's report reveals inadequate protection against digital impersonation. Financial losses from phishing reach over $1 billion in 2023. Companies must…
PDF.js Vulnerability Threatens Users
Critical PDF.js vulnerability allows arbitrary code execution. Users must update to version 4.2.67 or higher. Implement strict security policies to…
Researchers Examine Microsoft Entra Sync Vulnerabilities
Researchers find vulnerabilities in Microsoft Entra Sync tools. Tier Zero Security emphasizes need for robust security measures. Past analyses align…
Microsoft Launches AI Feature for PC Activity Recording
Microsoft introduces AI feature Recall for Windows 11. Recall captures and stores user activities locally. Privacy concerns arise over comprehensive…
Void Manticore Targets Israeli Organizations
Void Manticore targets Israeli organizations using wipers and ransomware. Collaboration with Scarred Manticore enhances attack sophistication. Political motives drive their…
CasperSecurity Stealer Threatens Windows Users
CasperSecurity Stealer targets RDP credentials on Windows systems. It infiltrates through phishing, harmful downloads, and compromised websites. Proactive security measures…