Attack

Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?
Data Protection & Privacy Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?

A novel technique called "Bring Your Own Installer" (BYOI) has emerged to bypass Endpoint Detection and Response (EDR) protections, specifically targeting SentinelOne's tamper protection. This method enables cybercriminals to disable EDR agents, paving the way for deploying ransomware like the

Black Kingdom Ransomware – A Review
Malware & Threats Black Kingdom Ransomware – A Review

The world of cybersecurity faces relentless threats from increasingly sophisticated ransomware attacks, with the Black Kingdom ransomware emerging as a prominent and dangerous adversary. This malevolent software gained notoriety by targeting Microsoft Exchange servers, illustrating a significant

Are State-Backed Hackers Exploiting Unpatched Windows Flaw?
Malware & Threats Are State-Backed Hackers Exploiting Unpatched Windows Flaw?

Since 2017, a critical unpatched Microsoft zero-day vulnerability has been exploited by at least 11 state-sponsored threat groups worldwide, impacting Windows shortcut (.lnk) files. This flaw, identified as ZDI-CAN-25373 by Trend Micro's Trend Zero Day Initiative, allows attackers to execute

Trend Analysis: Ransomware Defenses in Healthcare
Malware & Threats Trend Analysis: Ransomware Defenses in Healthcare

Healthcare systems are increasingly vulnerable to ransomware attacks, a cyber threat that encrypts organizational data and demands ransom for decryption. This threat has escalated recently, presenting significant challenges to healthcare providers who are reliant on digital networks and patient

How Are Attackers Exploiting Windows Task Scheduler Flaws?
Malware & Threats How Are Attackers Exploiting Windows Task Scheduler Flaws?

Rupert Marais, our in-house Security specialist, brings extensive expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we delve into the multifaceted vulnerabilities discovered in the Windows task scheduling service, a critical component frequently

Is Your System Safe from the Commvault Web Server Flaw?
Infrastructure & Network Security Is Your System Safe from the Commvault Web Server Flaw?

Commvault, a name synonymous with reliable data protection, has been thrust into the spotlight due to a recent and critical security vulnerability in its web server. This flaw, officially tagged as CVE-2025-3928, opens the door for remote, authenticated attackers to infiltrate systems with ease.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later