Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used […]
Using Third-Party ID Providers Without Losing Zero Trust
With $4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who’s walking into your systems is devastating. ​The original article […]
11 Bugs Found in Perplexity AI’s Chatbot Android App
Researchers characterize the company’s artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek. ​The original article found on darkreading Read More
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place […]
Organizations Lack Incident Response Plans, But Answers Are on the Way
Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them. ​The original article found […]
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This […]
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. […]
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Palo Alto Networks has revealed that it’s observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious […]
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked […]
Zero-Day in CentreStack File Sharing Platform Under Attack
Gladinet’s platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy. ​The original article found on […]