
Fast Followers on a grand scale
Cybercriminals are launching real-world attacks within days of security researchers publishing proof-of-concept (POC) code and blasting the internet with requests looking to capitalize on unpatched devices.
Read more...
Unpatched Zyxel Firewalls exposed
An attacker can send a specially crafted UDP packet to port 500 on the internet exposed interface of the firewall and achieve unauthenticated command execution as the root user. A VPN does not need to be configured on the device
Read more...
W-9 forms as bait
Cybercriminals are using fake W-9 forms with malicious OneNote attachments to spread Emotet malware. Learn how to identify and protect against these threats.
Read more...
New MacOS-based info stealer
Discover how MacStealer malware exploits macOS systems to steal iCloud Keychain credentials, browser data, and cryptocurrency wallets. Stay protected with expert insights.
Read more...