|
You are here |
www.seqrite.com | ||
| | | | |
unit42.paloaltonetworks.com
|
|
| | | | | Two ongoing campaigns bear hallmarks of North Korean state-sponsored threat actors, posing in job-seeking roles to distribute malware or conduct espionage. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | EclecticIQ researchers observed multiple weaponized phishing emails probably targeting the Security Service of Ukraine (SSU), NATO allies like Latvia, and private companies, Culver Aviation. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | Cisco Talos recently discovered a phishing campaign using an open-source phishing toolkit called Gophish by an unknown threat actor. | |
| | | | |
www.zerodayinitiative.com
|
|
| | | [AI summary] A critical remote code execution vulnerability in SolarWinds Access Rights Manager allows attackers to execute arbitrary code with service account privileges if proper data validation is not enforced. | ||