Attackers
-
How Attackers Can Own a Business Without Touching the Endpoint
Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are)…
Read More » -
Attackers are pummeling networks around the world with millions of login attempts
Matejmo | Getty Images Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s indiscriminately assailing networks…
Read More » -
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
î ‚Apr 09, 2024î „NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver…
Read More » -
Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions
î ‚Mar 27, 2024î „NewsroomVulnerability / API Security A now-patched security flaw in the Microsoft Edge web browser could have been abused…
Read More » -
RunC Flaws Enable Container Escapes, Granting Attackers Host Access
î ‚Jan 31, 2024î „NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that could…
Read More » -
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
î ‚Jan 31, 2024î „NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux machines by taking advantage…
Read More » -
PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions
î ‚Jan 17, 2024î „NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity…
Read More » -
New Flaw Lets Attackers Bypass Security and Spoof Emails
î ‚Jan 03, 2024î „NewsroomCyber Threat / Email Security A new exploitation technique called Simple Mail Transfer Protocol (SMTP) smuggling can be…
Read More » -
New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security
î ‚Jan 01, 2024î „NewsroomEncryption / Network Security Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell…
Read More »