Third Party Risk Assessment

Third Party Risk Assessment

Adobe Acrobat queries antivirus programs that can inspect PDF files

June 24, 2022

Adobe Acrobat users might be at risk after security researchers…

Browsers Scroll to Text Fragment Feature Abused Cyberattacks

Browsers’ Scroll to Text Fragment feature could get abused in attacks

June 23, 2022

Research says threat actors could exploit the Scroll to Text…

Users Online Fingerprints Tracked Chrome Extensions Extension Fingerprint

Users’ online fingerprints could be tracked from Chrome extensions

June 22, 2022

Studies claim that anyone could find ways to track a…

CPS Chicago Public Schools Third-Party Risk Vendor Supplier Data Breach Cyberattack Incident Battle for Kids US

The CPS blame a third-party supplier for a data breach incident

June 22, 2022

Chicago Public Schools (CPS) have published an advisory regarding a…

The Blue Mockingbird group exploits the previously known Telerik flaw

June 22, 2022

A malicious threat group called Blue Mockingbird has targeted the…

Golang P2P Panchan Botnet Linux Servers Cryptojacking Miner

A new Golang-based P2P Panchan botnet targets Linux servers

June 21, 2022

A new Go language-based peer-to-peer botnet dubbed Panchan has been…

Syslogk Linux Rootkit Curated Packets Backdoor Trojan

The Syslogk Linux rootkit utilises curated packets to activate a backdoor

June 18, 2022

Syslogk, a new Linux rootkit, is used by hackers in…

Intel AMD Processors Digital Risk Hertzbleed Cyberattack Side Channel

Intel and AMD processors are at risk against the new Hertzbleed attack

June 17, 2022

Remote threat operators can now execute a new side-channel attack…

Linux Systems Symbiote Malware Cybersecurity

Linux systems were targeted by the new Symbiote malware

June 16, 2022

The Symbiote is a new malware that has been spotted…

Roblox gaming platform leveraged by threat actors to sell decryptors

June 16, 2022

A new ransomware operation has been found with a unique…