Blog

Blog
Critical Vulnerabilities in Linux Enable Exfiltration of Password Hashes through Core Dumps in Ubuntu, RHEL, and Fedora

Two information disclosure vulnerabilities have been identified in Apport and systemd-coredump, the core dump handling systems used in various Linux…

Blog
Exploitation of Critical Vulnerability in vBulletin Forum Software by Cyber Threat Actors

Recent discoveries have identified two critical vulnerabilities in the open-source forum software vBulletin, one of which is confirmed to be…

Blog
Microsoft Initiates Testing of Notepad Text Formatting Features in Windows 11
Blog
Comstar LLC Enters into Corrective Action Plan and Settlement Agreement with HHS OCR

In May 2022, it was reported that Comstar LLC, an ambulance billing service based in Massachusetts, initiated notifications to an…

Blog
Law Enforcement Disrupts AVCheck Platform Exploited by Cybercriminals for Malware Assessment

An international law enforcement operation has successfully dismantled AVCheck, a service utilized by cybercriminals for testing the detection capabilities of…

Blog
Mandatory Disclosure of Ransom Payments by Australian Cybercrime Victims to Government Authorities

Australia has recently implemented groundbreaking legislation that mandates organizations to report any extortion payments made to cybercriminals as a result…