CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Apr 17, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure…
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
Apr 15, 2025The Hacker NewsData Privacy / Enterprise Security Everybody knows browser…
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT…
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Apr 14, 2025Ravie LakshmananCyber Attack / Malware A threat actor with ties…
CTM360 Uncovers a Play Masquerading Party
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a…
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry…
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit
Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has revealed that threat…
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Apr 11, 2025Ravie LakshmananVulnerability / Network Security Palo Alto Networks has revealed…


