Pulse VPN patched their vulnerability, but businesses are trailing behind

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Read more

New iOS exploit checkm8 allows permanent compromise of iPhones

A new exploit for iOS enables attackers to gain permanent access to iPhones, iPads, Apple Watches, and more—with zero potential for patching. Learn why this is possibly the biggest security news for iOS since its inception.

Read more

Five years later, Heartbleed vulnerability still unpatched

The Heartbleed vulnerability was discovered and fixed in 2014, yet today—five years later—there are still unpatched systems.

Read more

The Hidden Bee infection chain, part 1: the stegano pack

The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That’s why we’re dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Read more

Exploit kits: summer 2019 review

In this edition of our seasonal review of exploit kits, we review active and unique EKs hitting consumers and businesses over the summer 2019 season.

Read more

Hidden Bee: Let’s go down the rabbit hole

The complex and sophisticated custom malware, Hidden Bee, is a Chinese cryptominer that recently released an updated sample. We unpack the sample to look at the functionality of its loader and compare it against earlier versions.

Read more

Electrum Bitcoin wallets under siege

Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.

Read more

Google Chrome zero-day: Now is the time to update and restart your browser

A particularly dangerous Google Chrome zero-day is already being used in real-world attacks. Despite Google’s auto update feature, users will need to close and restart their browser in order to be protected.

Read more

A week in security (February 25 – March 3)

A roundup of the past week’s news, including mobile threats, viral scares, PDF tracking, and more.

Read more

How threat actors are using SMB vulnerabilities

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Read more

Select your language