fp-4a
-
Cybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Cybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
A recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
The Coyote banking Trojan, active since February 2024, is the first malware to exploit the Windows UI Automation framework, targeting banks and crypto exchanges in Brazil. Learn how it operates and the risks involved.
-
Cybersecurity researchers reveal a campaign targeting poorly secured Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based DDoS malware using Discord for command-and-control.
-
Microsoft has disclosed a critical zero-day vulnerability in SharePoint Server (CVE-2025-53770) with a CVSS score of 9.8. Learn about the active exploitation, impact on enterprises, and emergency patches available.