Zscaler Product Security Update Advisory

Overview   An update has been released to address vulnerability in Zscaler product. Users of...

JAVS AV Software Security Update Advisory

Overview   An update has been released to address vulnerabilities in JAVS AV software. Users...

TP-Link Product Security Update Advisory

Overview   An update has been released to address vulnerabilities in TP-Link products. Users of...

Telerik Report Server Product Security Update Advisory

Overview   An update has been released to address vulnerability in the Telerik Report Server...

Check Point Quantum Gateway Product Security Update Advisory

Overview   An update has been released to address vulnerability in the Check Point Quantum...

PMB Services Security Update Advisory

Overview   An update has been released to address vulnerabilities in the PMB service. Users...

Dell family security update advisory

Overview   An update has been released to address vulnerabilities in the DELL family of...

Google Chrome Browser (125.0.6422.141/.142) Security Update Advisory

Overview   Google has released an update to address a vulnerability in the Chrome(https://www.google.com/chrome) browser....

Keylogger Installed Using MS Office Equation Editor Vulnerability (Kimsuky)

Keylogger Installed Using MS Office Equation Editor Vulnerability (Kimsuky)

AhnLab SEcurity intelligence Center (ASEC) has identified the details of the Kimsuky threat group recently exploiting a vulnerability (CVE-2017-11882) in the equation editor included in MS Office (EQNEDT32.EXE) to distribute a keylogger. The threat actor distributed the keylogger by exploiting the vulnerability to run a page with an embedded malicious

Bondnet Using Miner Bots as C2

Bondnet Using Miner Bots as C2

Bondnet first became known to the public in an analysis report published by GuardiCore in 20171 and Bondnet’s backdoor was covered in an analysis report on XMRig miner targeting SQL servers released by DFIR Report in 20222. There has not been any information on the Bondnet threat actor’s activities thereon,