Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation OVERVIEW Multiple vulnerabilities have been discovered in...
Threat Advisories
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution OVERVIEW Multiple vulnerabilities have been discovered in...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution OVERVIEW Multiple vulnerabilities have been discovered in...
LokiBot Malware Exploits Microsoft Word Vulnerabilities for Widespread Distribution
LokiBot Malware Exploits Microsoft Word Vulnerabilities for Widespread Distribution OVERVIEW Researchers recently uncovered a LokiBot...
A Vulnerability in FortiOS and FortiProxy Could Allow for Remote Code Execution
A Vulnerability in FortiOS and FortiProxy Could Allow for Remote Code Execution OVERVIEW A vulnerability has been discovered in Fortinet...
Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in VMware Products Could Allow for Arbitrary Code Execution OVERVIEW Multiple vulnerabilities have been discovered...
RDStealer Malware Targeting Remote Desktop
RDStealer Malware Targeting Remote Desktops SUMMARY Bitdefender researchers published a warning related to new malware that is actively...
#Stop Ransomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
#Stop Ransomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability SUMMARY The Federal Bureau of Investigation (FBI) and the...
Critical Patches Issued for Microsoft Products
Critical Patches Issued for Microsoft Products OVERVIEW Multiple vulnerabilities have been discovered in Microsoft products, the most severe...
Trigona Ransomware targeting MS-SQL Servers
Trigona Ransomware targeting MS-SQL Servers SUMMARY Internet exposed Microsoft SQL (MS-SQL) servers are being targeted by threat actors using...
