Check Point VPN Vulnerability
Introduction Recently, Check Point has reported targeted attacks on their Remote Access VPN devices, causing concern for many businesses that rely on these networks for…
Introduction Recently, Check Point has reported targeted attacks on their Remote Access VPN devices, causing concern for many businesses that rely on these networks for…
Cyber security experts have recently identified a sophisticated cryptojacking campaign that employs a new type of malware named “GhostEngine.” This malware leverages vulnerable drivers to…
Introduction In May 2024, cyber security researchers uncovered a significant vulnerability within QNAP’s QTS operating system, a critical software powering the company’s NAS (Network Attached…
A new threat has emerged for Android users: the Antidot Android Banking Trojan. This sophisticated malware, disguised as a Google Play update, is designed to…
Introduction The Grandoreiro banking trojan, a notorious malware primarily targeting banks, has resurfaced in a global campaign since March 2024. After a temporary disruption by…
The Black Basta ransomware group has recently launched an aggressive social engineering campaign targeting businesses. Originating from the remnants of the disbanded Conti group, Black…
Overview Google has released an emergency update to address a new zero-day vulnerability in its Chrome browser. This high-severity flaw, identified as CVE-2024-4761, is actively…
Microsoft’s latest security update cycle, known as Patch Tuesday, arrived in May 2024 with fixes for 61 vulnerabilities. Among these, the exploitation of the zero-day…
What is it? TunnelVision is a new security vulnerability that affects VPN applications. It allows attackers to steal data that should be encrypted by the…