Threats

Zero-Day Flaws Found in Several Leading EDR, AV Solutions

SafeBreach Labs researcher Or Yair has uncovered zero-day vulnerabilities in several leading endpoint detection and response (EDR) and antivirus (AV) solutions that enabled him to turn the tools into...

Average Fortune 500 Company Has 476 Critical Vulnerabilities

In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available...

HP Wolf Warns of Surge in Malware Hidden in ZIP, RAR Files

Archive files are now the most common file type used to deliver malware – eclipsing Microsoft Office files for the first time – according to HP Wolf Security's Q3 2022 Quarterly Threat Insights Report...

Researchers Find Supply Chain Vulnerability in IBM Cloud

The Wiz Research Team recently discovered a supply chain vulnerability in IBM Cloud that they say is the first to impact a cloud provider's infrastructure. In a dramatic flair, they named the flaw...

Main Targets of Ransomware Attacks & What They Look For

Ransomware has become a potent tool for cyber criminals looking to exploit companies' sensitive data for profit. Ransomware attacks have affected businesses across all sizes, locations, and industries...

Almost Half of All Chrome Extensions Are Potentially High-Risk

In a recent study of 1,237 Chrome extensions with a minimum of 1,000 downloads, Incogni researchers found that nearly half ask for permissions that could potentially expose personally identifiable inf...

Russian Infostealer Gangs Steal 50 Million Passwords

Group-IB cybersecurity researchers recently identified several Russian-speaking cybercrime groups offering infostealing malware-as-a-service (MaaS), resulting in the theft of more than 50 million pass...

What is Malware? Definition, Purpose & Common Protections

Anyone who has used a computer for any significant length of time has probably at least heard of malware. Short for “malicious software,” malware is any piece of computer software designed to disrupt ...

Microsoft Warns of Surge in Token Theft, Bypassing MFA

The Microsoft Detection and Response Team (DART) recently warned that attackers are increasingly using token theft to circumvent multi-factor authentication (MFA). "By compromising and replaying a...

Vulnerability Patching: How to Prioritize and Apply Patches

Every IT environment and cybersecurity strategy has vulnerabilities. To avoid damage or loss, organizations need to find and eliminate those vulnerabilities before attackers can exploit them. Some...

Latest articles