Cato Report Reveals Log4J Remains a Leading Exploited Vulnerability
A recent report by Cato Cyber Threat Research Labs (CTRL) revealed that the Log4J vulnerability (CVE-2021-44228) exploit…
A recent report by Cato Cyber Threat Research Labs (CTRL) revealed that the Log4J vulnerability (CVE-2021-44228) exploit…
A critical zero-day vulnerability affecting Palo Alto Networks’ PAN-OS firewalls has been actively exploited since March 26th,…
A critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software is now actively being exploited in…
CISA Adds Microsoft Streaming Service Bug to List of Known Exploited Vulnerabilities The U.S. Cybersecurity and Infrastructure…
On Jan 09, 2024, newsroom reported a cyber attack campaign, named ‘RE#TURGENCE’, targeting poorly secured Microsoft SQL…
An issue has been discovered by security researchers at Akamai that could allow attackers to spoof DNS…
Researchers have issued a warning about an increase in crypto spam and scam messages that use the…
A new type of malware attack, known as Balada malware injection, has been discovered. This attack specifically…
Apple has released emergency security updates for iOS, iPadOS, macOS, and watchOS to address two zero-day flaws…