SIEM as a Service
Home Search

malicious attacker - search results

If you're not happy with the results, please do another search
Cybersecurity in Healthcare Apps: Most Common Risks

Cybersecurity in Healthcare Apps: Most Common Risks

Various software solutions are present in all industries, including the healthcare sector. For decades, medical institutions and practitioners have relied on different types of...
Why Permission Access is Essential for Robust Cyber Security

Why Permission Access is Essential for Robust Cyber Security

In the age of digital transformation, our lives are increasingly intertwined with the online world. Almost everything we do has something to do with...
PoC Exploit Released for Ivanti EPMM MobileIron Core

PoC Exploit Released for Ivanti EPMM MobileIron Core

A newly disclosed vulnerability, CVE-2024-22026, has been found in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core. This vulnerability allows a local attacker to gain...
Hackers Exploiting Quick Assist Tool To Deliver Ransomware

Hackers Exploiting Microsoft’s Quick Assist Tool To Deliver Ransomware

Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort.  These tools have been built for...
Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now

Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now

Apple has released security updates to address a zero-day vulnerability in its Safari web browser that was exploited during this year's Pwn2Own Vancouver hacking...
Critical SAP NetWeaver & CX Commerce

Critical SAP NetWeaver & CX Commerce Flaw Leads To Complete Takeover

Three vulnerabilities associated with CSS injection, file upload, and remote code execution have been discovered in the SAP Customer Experience (CX) commerce cloud and...
5 Common Phishing Vectors and Examples – 2024

5 Common Phishing Vectors and Examples – 2024

Phishing attacks can be executed through various means, such as SMS and phone calls, but the most prevalent method involves sending victims emails containing...
Turla APT Group Attacking European Ministry of Foreign Affairs

Turla APT Group Attacking European Ministry of Foreign Affairs

The well-known advanced persistent threat (APT) group Turla, based in Russia, is said to be going after the European Ministry of Foreign Affairs. This new...
Microsoft Security Update may

Alert! Microsoft Fixes 60 Vulnerabilities With 2 Actively Exploited Zero-Days

In its May 2024 Patch Tuesday release, Microsoft addressed 60 vulnerabilities, including 2 zero-day vulnerabilities actively exploited in the wild. The updates cover a range...
Hackers Weaponize Word Files To Deliver DanaBot Malware

Hackers Weaponize Word Files To Deliver DanaBot Malware

Recent email campaigns distribute DanaBot malware through two document types: those using equation editor exploits and those containing external links, where attackers send emails...
SIEM as a Service

Recent Posts