Top

Category: Threats & Malware

Threats and Malware


Network security, Security, Threats & Malware, Virus & Malware

NXM Autonomous Security platform protects space infrastructure and IoT devices from cyberattacks

July 1, 2022

Via: Help Net Security

NXM Labs unveiled its NXM Autonomous Security platform that prevents hackers from gaining unauthorized access to commercial, industrial, medical, or consumer internet of things (IoT) devices. Tested in collaboration with the Jet Propulsion Laboratory (JPL), California Institute of Technology (Caltech), […]


Email security, Security, Threats & Malware, Virus & Malware

Product showcase: Group-IB Unified Risk Platform

July 1, 2022

Via: Help Net Security

The cyber threat landscape has intensified. Threat actors are organized and professionalized, with ransomware gangs outsourcing the first step of their operations to Initial Access Brokers. This alliance has proven profitable for both sides, as the illegal sale of initial […]


Data loss, Threats & Malware

RansomHouse claims to have stolen at least 450GB of AMD’s data

June 30, 2022

Via: Malwarebytes

AMD is investigating the claim that the RansomHouse extortion group has its hands on more than 450GB of the company’s data.AMD’s breach revelation came to light after RansomHouse teased on Telegram about selling data belonging to a popular ‘three-letter company […]


Threats & Malware, Vulnerabilities

Vulnerability in Amazon Photos Android App Exposed User Information

June 30, 2022

Via: Security Week

With more than 50 million downloads, Amazon Photos offers cloud storage, allowing users to store photos and videos at their original quality, as well as to print and share photos, and to display them on multiple Amazon devices. In November […]


Threats & Malware, Vulnerabilities

Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies

June 30, 2022

Via: Security Week

According to Broadcom, the Brocade SANnav storage area network (SAN) management application is affected by nine vulnerabilities. Patches have been made available for these security holes. Six of them impact third-party components such as OpenSSL, Oracle Java and NGINX, and […]


Threats & Malware, Virus & Malware

G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks

June 30, 2022

Via: Help Net Security

Developed in partnership with Intel, the XDP-based solution removes the need for a dedicated DDoS protection server role. An SYN Flood is a type of DDoS (Denial of Service) attack that is designed to make an online network or system […]


Threats & Malware, Virus & Malware, Vulnerabilities

EMEA continues to be a hotspot for malware threats

June 30, 2022

Via: Help Net Security

Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the WatchGuard Threat Lab. Researchers also found that the Emotet botnet came back in a […]


Threats & Malware, Vulnerabilities

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers

June 29, 2022

Via: The Hacker News

A new security vulnerability has been disclosed in RARlab’s UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to […]


Threats & Malware, Vulnerabilities

New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

June 29, 2022

Via: The Hacker News

Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft’s Service Fabric that could be exploited to obtain elevated permissions and seize control of all nodes in a cluster. The issue, which has […]


Threats & Malware, Vulnerabilities

Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

June 29, 2022

Via: Security Affairs

The presence of these vulnerabilities within the infrastructure of an organization could potentially expose it to a broad range of attacks. “Welcome to the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list (CWE™ Top 25). This […]