Tag: endpoint security

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide...

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of...

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May...

How Attackers Can Personal a Enterprise With out Touching the Endpoint

Attackers are more and more making use of "networkless" assault methods focusing on cloud apps and identities. This is how attackers can (and are)...

Malicious Google Advertisements Pushing Faux IP Scanner Software program with Hidden...

A brand new Google malvertising marketing campaign is leveraging a cluster of domains mimicking a reliable IP scanner software program to ship a beforehand...

TA558 Hackers Weaponize Photos for Vast-Scale Malware Assaults

The risk actor tracked as TA558 has been noticed leveraging steganography as an obfuscation approach to ship a variety of malware resembling Agent Tesla,...

TA547 Phishing Assault Hits German Companies with Rhadamanthys Stealer

A menace actor tracked as TA547 has focused dozens of German organizations with an info stealer known as Rhadamanthys as a part of an...

Microsoft Fixes 149 Flaws in Big April Patch Launch, Zero-Days Included

Microsoft has launched safety updates for the month of April 2024 to remediate a file 149 flaws, two of which have come below energetic...

Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

Bogus installers for Adobe Acrobat Reader are getting used to distribute a brand new multi-functional malware dubbed Byakugan. The start line of the assault is...

Detecting Home windows-based Malware By way of Higher Visibility

Regardless of a plethora of obtainable safety options, an increasing number of organizations fall sufferer to Ransomware and different threats. These continued threats...

Most popular