Varshini

37 POSTS

Exclusive articles:

How Threat Actors Use BAT Files To Deliver Quasar RAT

Security researchers have noted a resurgence of Quasar RAT campaigns leveraging highly obfuscated Windows batch files as initial loaders. Quasar RAT has been a persistent...

OneLogin AD Connector Flaws Expose Authentication Credentials

A wave of security concerns has emerged around OneLogin’s Active Directory (AD) Connector after a security researcher revealed a series of technical vulnerabilities that...

Account Takeover Campaign Exploits Pentesting Tool To Target Entra ID Users

A major cybersecurity threat has emerged with the discovery of a widespread account takeover campaign targeting Microsoft Entra ID users. Security researchers recently identified...

The Rise Of CSPM In Multi-Cloud Environments: What CISOs Need To Know 

Not too long ago, moving to the cloud felt like a major leap forward. It offered companies the freedom to scale fast, reduce infrastructure...

Breaking

LANDFALL Android Malware Exploits Samsung Zero-Day via Malicious WhatsApp Image

Cybersecurity researchers at Palo Alto Networks' Unit 42 have...

Microsoft Teams “Chat with Anyone” Feature Raises Security Concerns Over Phishing Risks

Microsoft's upcoming Teams update, rolling out in targeted releases...

New ClickFix Campaign Uses Malicious Videos to Make Users Infect Themselves

A sophisticated ClickFix social engineering campaign has emerged featuring...

Herodotus Android Malware Gains Total Device Access, Bypassing Antivirus Defenses

A newly discovered Android banking Trojan, Herodotus, is circulating...
spot_imgspot_img