The notorious APT hacking group known as FIN7 launched a network of fake AI-powered deepnude generator sites to infect visitors with information-stealing malware. […] Go to Source Author: Bill Toulas
Category Archives: Security
CISA warned today that a critical Ivanti vulnerability that can let threat actors gain remote code execution on vulnerable Endpoint Manager (EPM) appliances is now actively exploited in attacks. […] Go to Source Author: Sergiu Gatlan
A new ‘FakeUpdate’ campaign targeting users in France leverages compromised websites to show fake browser and application updates that spread a new version of the WarmCookie malware. […] Go to Source Author: Bill Toulas
U.S. cybersecurity agency CISA is warning about two critical vulnerabilities that allow authentication bypass and remote code execution in Optigo Networks ONS-S8 Aggregation Switch products used in critical infrastructure. […] Go to Source Author: Bill Toulas
A new generation of malware is on the rise, and it’s proving to be a formidable opponent for businesses of all sizes. Fileless malware is just one of the many types of attacks that organizations need to be aware of and prepared to defend against. What is fileless malware? Fileless malware is a type of […]
2024October2Security_B, application whitelisting, cybersecurity, endpoint protection, fileless malware, General Articles B, network segmentation, network traffic monitoring, phishing awareness training, PowerShell logging, Security, software patching
Unmasking fileless malware: How hackers attack without a trace
The techniques cybercriminals use to hack into systems are not any simpler. Today, there’s a glut of malware types that don’t rely on traditional methods for infiltration. Fileless malware, in particular, is an incredibly elusive and dangerous threat that can bypass even the most sophisticated security measures. What is fileless malware? Fileless malware is a […]
2024October2Security_A, application whitelisting, cybersecurity, endpoint protection, fileless malware, General Articles A, network segmentation, network traffic monitoring, phishing awareness training, PowerShell logging, Security, software patching
Fileless malware: The invisible threat in your system
Cybercriminals are always coming up with new, unpredictable ways to breach a company’s cyber defenses. One of the most elusive threats is fileless malware — an attack method that leaves no traditional trace behind. What is fileless malware? Fileless malware is a type of malicious program that operates without using executable files to infect a […]
Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply by sending specially crafted emails to the SMTP server. […] Go to Source Author: Bill Toulas
Hackers are actively exploiting a recently disclosed RCE vulnerability in Zimbra email servers that can be triggered simply by sending specially crafted emails to the SMTP server. […] Go to Source Author: Bill Toulas
DrayTek has released security updates for multiple router models to address 14 vulnerabilities of varying severity, including a remote code execution flaw that received the maximum CVSS score of 10. […] Go to Source Author: Bill Toulas



