Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

14/03/2024 0 Comments 0 tags

Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execution with elevated privileges under specific circumstances. “The

RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage

14/03/2024 0 Comments 0 tags

The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant (PCA) to execute malicious commands. “The Program Compatibility Assistant Service (pcalua.exe) is a Windows

3 Things CISOs Achieve with Cato

14/03/2024 0 Comments 0 tags

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs

Ande Loader Malware Targets Manufacturing Sector in North America

14/03/2024 0 Comments 0 tags

The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to deliver remote access trojans (RATs) like Remcos RAT and NjRAT. The attacks,

DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack

14/03/2024 0 Comments 0 tags

A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw in Microsoft Windows as a zero-day using bogus software installers. “During this campaign, users were lured

Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

14/03/2024 0 Comments 0 tags

Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to achieve code execution on affected systems. “An improper neutralization of special elements used

Demystifying a Common Cybersecurity Myth

14/03/2024 0 Comments 0 tags

One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on their own—this is simply not the case. In our latest whitepaper OPSWAT CEO and Founder,

PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users

14/03/2024 0 Comments 0 tags

The threat actors behind the PixPirate Android banking trojan are leveraging a new trick to evade detection on compromised devices and harvest sensitive information from users in Brazil. The approach

Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms

13/03/2024 0 Comments 0 tags

Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications that are especially vulnerable in this attack vector. The use of SaaS applications involves a wide range

Researchers Highlight Google’s Gemini AI Susceptibility to LLM Threats

13/03/2024 0 Comments 0 tags

Google’s Gemini large language model (LLM) is susceptible to security threats that could cause it to divulge system prompts, generate harmful content, and carry out indirect injection attacks. The findings come from