EDR❌ Soon a History (XDR)✅

EDR❌ Soon a History (XDR)✅

The success of many organizations in endpoint detection and response (EDR) products in recent years may reached the end of technology. Ironically threats are getting sophisticated to get attention new…
Purple Lambert

Purple Lambert

Multiple antivirus companies received a collection of malware samples, some of them cannot be associated with the activity of known APT groups.These malware strains did not present any similarities with…
Naikon Hits hard

Naikon Hits hard

Threat actor dubbed "Naikon APT," laid out the ever-changing tactics, techniques, and procedures adopted by the group, including weaving new backdoors named "Nebulae" and "RainyDay" into their data-stealing missions. Alleged…
Sharepoint Servers in Ransomware Circle

Sharepoint Servers in Ransomware Circle

Microsoft SharePoint servers have now joined the list of network devices being abused as an entry vector into corporate networks by ransomware gangs.SharePoint now joins a list that also includes…
F5 BIG IP Vulnerable to Kerberos

F5 BIG IP Vulnerable to Kerberos

A new bypass vulnerability in the Kerberos Key Distribution Center (KDC) security feature impacting F5 Big-IP application delivery services. The KDC Spoofing vulnerability allows an attacker to bypass the Kerberos…
Chrome V8 Engine Bug

Chrome V8 Engine Bug

The flaw, tracked as CVE-2021-21227 and rated high severity, which Google described as “insufficient data validation in V8.” The flaw can be exploited for remote code execution in the targeted…
Eaton Disrupts Power

Eaton Disrupts Power

Eaton’s IPM solution is designed to ensure system uptime and data integrity by allowing organizations to remotely monitor, manage and control the uninterruptible power supply (UPS) devices on their network.…