Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry…
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has revealed that threat…
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Apr 11, 2025Ravie LakshmananVulnerability / Network Security Palo Alto Networks has revealed…
Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating…
New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner
Apr 09, 2025Ravie LakshmananWindows Security / Vulnerability A Chinese-affiliated threat actor known…
CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks
Apr 07, 2025Ravie LakshmananMalware / Network Security Cybersecurity agencies from Australia, Canada,…
Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code
Apr 04, 2025Ravie LakshmananVulnerability / Cloud Security A maximum severity security vulnerability…
OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
Apr 04, 2025Ravie LakshmananThreat Intelligence / Malware A novice cybercrime actor has…
Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
Apr 05, 2025Ravie LakshmananMalware / Supply Chain Attack Cybersecurity researchers have uncovered…