| Apr 7, 2021 Two Vulnerabilities affect FireEye EX 3500 This report is about two vulnerabilities affecting FireEye EX 3500. The vulnerabilities are identified as CVE-2021-28970 and CVE-2021-28969.
| Mar 11, 2021 Operation Exchange Marauder: Mass exploitation of Microsoft Exchange On March 2, 2021, Microsoft released a series of emergency security patches for Exchange Server 2019, 2016, 2013, and 2010 in order to combat several vulnerabilities.
| Mar 8, 2021 DarkSide Ransomware Overview DarkSide ransomware is a Ransomware-as-a-Service (RaaS), primarily targeting Windows systems with the ability to target Linux OS variants.
| Feb 22, 2021 New Phishing Campaign uses Morse Code to avoid detection This report is about a new phishing campaign that uses a unique method of obfuscation to avoid detection by traditional security appliances.
| Feb 15, 2021 Severe Windows Vulnerabilities impact Windows Client & Server OS Versions 7 and Above This report is about three high severity Windows TCP/IP vulnerabilities tracked as CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086.
| Feb 9, 2021 Zero Trust SIEM Strategy (Role of SIEM in Zero Trust Environment) Learn how your Security information and event management (SIEM) aids in mitigating risk as part of your larger Zero Trust Strategy.
| Feb 3, 2021 Heap-Based Buffer Overflow Vulnerability Discovered in Sudo (TIR-20210131) This report is regarding a recently discovered heap-based buffer overflow vulnerability within the widely used Sudo utility.
| Jan 24, 2021 Recent additions to TeamTNT Malware Campaign on Cloud Environments This report is about the recent additions to the TeamTNT malware campaign to infect cloud environments and it is updated to capture AWS IAM user details more effectively.
| Jan 6, 2021 New Golang Worm targets MySQL, Jenkins, Oracle WebLogic and other public services Threat report on the new malware Golang Worm which is targeting services such as MySQL, Jenkins, and Oracle WebLogic.
| Dec 28, 2020 What is Mobile App Testing? Cybersecurity specialists utilize an assortment of tests and techniques to screen for vulnerabilities in order to evaluate the security of a mobile app.