Tag: Information security

The Past, Present, and Future

While you learn experiences about cyber-attacks affecting operational know-how (OT), it is simple to get caught up within the hype and assume each single...

New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport...

A brand new phishing marketing campaign is focusing on U.S. organizations with the intent to deploy a distant entry trojan referred to as NetSupport...

Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool

Fortra has launched particulars of a now-patched crucial safety flaw impacting its FileCatalyst file switch resolution that would enable unauthenticated attackers to realize distant...

Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

Fortinet has warned of a essential safety flaw impacting its FortiClientEMS software program that would enable attackers to realize code execution on affected methods. "An...

Microsoft’s March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws

Microsoft on Tuesday launched its month-to-month safety replace, addressing 61 totally different safety flaws spanning its software program, together with two important points impacting...

Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

Microsoft on Friday revealed that the Kremlin-backed menace actor often known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to achieve entry to...

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organization

An unnamed Islamic non-profit group in Saudi Arabia has been focused as a part of a stealthy cyber espionage marketing campaign designed to drop...

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

The menace actor often known as UAC-0050 is leveraging phishing assaults to distribute Remcos RAT utilizing new methods to evade detection from safety software...

Most popular