SIEM as a Service
Home Search

malware - search results

If you're not happy with the results, please do another search
Apache Struts RCE Vulnerability Exposes Servers to Malicious File Uploads

Apache Struts RCE Vulnerability Exposes Servers to Malicious File Uploads

A critical security vulnerability has been discovered in Apache Struts 2, a popular open-source web application framework, potentially exposing numerous organizations to severe cyber...
New BadRAM Attack Exploits AMD SEV Protections, Threatens Cloud Security

New BadRAM Attack Exploits AMD SEV Protections, Threatens Cloud Security

Researchers have uncovered a critical vulnerability in AMD’s Secure Encrypted Virtualization (SEV) technology that could compromise sensitive data in cloud environments. Dubbed "BadRAM," this attack...
Splunk Secure Gateway App Vulnerability

Splunk Secure Gateway App Vulnerability Let Attackers Execute Remote Code

A critical vulnerability has been discovered in the Splunk Secure Gateway app, potentially allowing low-privileged users to execute arbitrary code remotely. The flaw, identified as...
Windows UI Automation Framework Vulnerability

Critical Windows UI Automation Framework Vulnerability Let Hackers Bypass EDR

Security researchers have uncovered a novel attack method that exploits Microsoft's UI Automation framework, potentially leaving millions of Windows users vulnerable. This technique, discovered...
Fortinet Acquired Perception Point

Fortinet Acquired Perception Point to Boost Email Security

Fortinet, a global leader in cybersecurity solutions, today announced the completion of its acquisition of Perception Point, a pioneer in advanced collaboration and email...
Microsoft Azure MFA Vulnerability Allows Unauthorized User Account Access

Microsoft Azure MFA Vulnerability Allows Unauthorized User Account Access

A critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation has been uncovered by Oasis Security's research team, potentially exposing over 400 million Office 365...
Researchers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Researchers Uncovered Zloader DNS Tunneling Tactics For C2 Communication

An updated version of Zloader (2.9.4.0) has been discovered, which includes a Domain Name System (DNS) tunnel for command-and-control (C2) connections, an interactive shell...
Krispy Kreme Hacked

Krispy Kreme Hacked, Attackers Gain Unauthorized Access to IT Systems

Krispy Kreme, the iconic doughnut chain, has become the latest victim of a cyberattack that has disrupted its online ordering system in parts of...
Chinese Hacker Charged for Hacking 81,000+ Firewalls Worldwide

Chinese Hacker Charged for Hacking 81,000+ Firewalls Worldwide

The cybersecurity firm Sichuan Silence and one of its employees, Guan Tianfeng, have been sanctioned by the Department of the Treasury's Office of Foreign...
Microsoft Office And Excel Vulnerabilities Expose Systems To Remote Code Execution And Privilege Escalation

Microsoft Office & Excel Vulnerabilities Expose Systems To RCE & Privilege Escalation

Microsoft disclosed two significant vulnerabilities affecting its Office and Excel products as part of its December Patch Tuesday updates. These vulnerabilities tracked as CVE-2024-49059 and...
SIEM as a Service

Recent Posts