Third Party Risk Assessment

Third Party Risk Assessment
Geacon Cobalt Strike Malware Variant macOS Apple

Geacon, a Cobalt Strike variant, targets macOS users

June 7, 2023

A recent study showed that a surge of cybercriminal operations…

TP-Link Routers Vulnerability Security Flaw Mustang Panda Hacker Group Chinese Hackers

TP-Link Routers vulnerable to Mustang Panda exploits

June 1, 2023

Researchers have linked the Mustang Panda threat group to a…

AI-Powered Redline Stealer Malware Infostealer Cyber Threat Cybersecurity SEO Poisoning

AI-empowered Redline Stealer poses a threat to cybersecurity

May 25, 2023

Recently, a malicious advertising campaign has utilised the Google Search…

KeePass Security Flaw Vulnerability Hackers Master Passwords Third Party Risk

KeePass flaw could allow hackers to retrieve master passwords

May 25, 2023

KeePass, an open-source password manager, has shown a vulnerability within…

OpenAI Bug Exploit Hackers Unlimited Free Credit Chat GPT

OpenAI bug could allow hackers to gain unlimited free credit

May 25, 2023

Hackers exploited a flaw in the OpenAI account validation to…

Siemens Security Flaw Hackers Power Grids ICS Critical Flaw

A Siemens flaw could let hackers destabilise power grids

May 24, 2023

Siemens industrial control systems (ICS) have a critical vulnerability that…

TBK DVR CCTV Devices Video Recorder Exposed Data Vulnerability Exploit Threat Actors

TBK DVR devices exposed to exploits from threat actors

May 24, 2023

Researchers discovered an unpatched authentication bypass vulnerability in the TBK…

Hackers Flaw Exploit PaperCut Vulnerability Campaign Ransomware

Hackers exploit the PaperCut vulnerability in an ongoing campaign

May 17, 2023

An active cybercriminal campaign has targeted the PaperCut vulnerability, a…

Data Breach Brightline Patient Records Healthcare Clop Ransomware

Data breach on Brightline affected thousands of patients

May 11, 2023

Brightline, a pediatric mental health provider, notified its patients of…

Hackers Action1 Remote Management Ransomware Cyberattack Campaign Brand Abuse Vendor Risk Endpoint

Hackers leveraged Action1 to execute ransomware campaigns

April 24, 2023

Malicious threat groups have increasingly utilised the genuine remote access…