Varshini

37 POSTS

Exclusive articles:

How Threat Actors Use BAT Files To Deliver Quasar RAT

Security researchers have noted a resurgence of Quasar RAT campaigns leveraging highly obfuscated Windows batch files as initial loaders. Quasar RAT has been a persistent...

OneLogin AD Connector Flaws Expose Authentication Credentials

A wave of security concerns has emerged around OneLogin’s Active Directory (AD) Connector after a security researcher revealed a series of technical vulnerabilities that...

Account Takeover Campaign Exploits Pentesting Tool To Target Entra ID Users

A major cybersecurity threat has emerged with the discovery of a widespread account takeover campaign targeting Microsoft Entra ID users. Security researchers recently identified...

The Rise Of CSPM In Multi-Cloud Environments: What CISOs Need To Know 

Not too long ago, moving to the cloud felt like a major leap forward. It offered companies the freedom to scale fast, reduce infrastructure...

Breaking

SonicWall SSL VPN Devices Targeted by Threat Actors to Deploy Akira Ransomware

A coordinated campaign by Akira ransomware operators has been...

Gladinet CentreStack & Triofox 0-Day RCE Vulnerability Under Active Exploitation

Huntress’ Security Operations Center (SOC) detected successful exploitation of...

Global Cyberattacks Using 175 Malicious npm Packages and 26,000 Downloads Against Technology and Energy Companies

Socket's Threat Research Team has uncovered a sophisticated phishing...

MalTerminal Malware Powered by LLM Technology Uses OpenAI GPT-4 to Generate Ransomware Code

Security researchers at SentinelLABS have unveiled MalTerminal, a novel proof-of-concept...
spot_imgspot_img