Third Party Risk Assessment

Third Party Risk Assessment
Google Chrome Valley RAT Malware Fake Apps Phishing

Bogus Chrome downloads launch a new ValleyRAT malware

February 26, 2025

A new version of the sophisticated ValleyRAT malware, notorious for…

Murdoc Mirai Malware Cameras Routers Cybercriminal Activity

Murdoc, a Mirai malware variant that exploits cameras and routers

February 17, 2025

A newly discovered large-scale exploitation campaign using a new Mirai…

Pycord-Self PyPi Package Discord Auth Tokens Hackers

PyPi package dubbed ‘pycord-self’ can steal Discord auth tokens

February 11, 2025

A malicious PyPi package called ‘pycord-self’ targets Discord developers to…

WordPress W3 Total Cache Flaw Cyberattacks

WordPress sites are prone to attacks due to a W3 Total Cache flaw

February 7, 2025

A critical vulnerability in the W3 Total Cache plugin employed…

Third-party Risk Assessment Digital Corporate Landscape External Vendors Cybersecurity

Third-party risk assessment: Key insights

February 6, 2025

A third-party risk assessment for external providers is critical to…

D-Link Routers Malware Botnet Ficora Capsaicin Cyberattack

D-Link routers exploited by two malware botnet variants

January 8, 2025

D-Link routers that have already reached their end-of-life status are…

SonicWall VPN Firewalls VPN Devices System Vulnerability Security Issues

SonicWall VPN firewalls are prone to exploitation due to a new bug

December 24, 2024

Thousands of publicly accessible SonicWall VPN firewalls are exposed to…

Avast Anti-Rootkit Driver Ransomware Attack Hackers Malware Campaign

Avast anti-rootkit driver exploit allows hackers to disable defences

December 6, 2024

A newly discovered cybercriminal operation currently exploits the alleged insecure…

Microsoft Exchange Vulnerability Phishing Emails Cyberattack

Hackers spoof authentic senders using an Exchange Server flaw

November 21, 2024

A new high-severity Exchange Server flaw can enable threat actors…

Fog And Akira Ransomware Veeam RCE Flaw Hackers Cybersecurity Remote Code Execution

Fog and Akira ransomware groups exploit the Veeam RCE flaw

October 17, 2024

The Fog and Akira ransomware groups are the latest cybercriminal…