Stay up to date on cyber security news across the industry with our currated newsfeed.
Two cyberattack campaigns are making the rounds using unique social-engineering techniques.
A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality.
Widely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more.
Original release date: April 16, 2021
WordPress versions 4.7-5.7 are affected by multiple vulnerabilities. An attacker could exploit one of these vulnerabilities to take control of an affected website.
CISA encourages users and a
Matt Bromiley, senior principal consultant with Mandiant, offers checklists for how small- and medium-sized businesses (SMBs) can identify and clear ProxyLogon Microsoft Exchange infections.
Listen now - and have your say on this divisive issue in our comments!
The zero-day flaw research group has revised its disclosure of the technical details of vulnerabilities in the hopes of speeding up the release and adoption of fixes.
A 100-day race to boost cybersecurity will rely on incentives rather than regulation, the White House said.
The IoT-targeted malware has also added new exploits for initial compromise, for Huawei, Realtek and Dasan GPON devices.
Original release date: April 15, 2021
CISA and the Department of Defense (DoD) Cyber National Mission Force (CNMF) have analyzed additional SolarWinds-related malware variants—referred to as SUNSHUTTLE and SOLARFLARE. One of the analyzed fil
Get a Demo
Let our team of security experts show you how ThreatWarrior can help you see everything happening on your network, learn behaviors and patterns, and act efficiently to stop threats other solutions miss.