Category: EN

Unmasking Agent Tesla: A Deep Dive into a Multi-Stage Campaign

FortiGuard Labs provides a technical breakdown of a multi-stage Agent Tesla campaign, from phishing and encrypted scripts to in-memory execution, process hollowing, and data exfiltration        This article has been indexed from FortiGuard Labs Threat Research Read the original article:…

Check Point Researchers Expose Critical Claude Code Flaws

Critical vulnerabilities, CVE-2025-59536 and CVE-2026-21852, in Anthropic’s Claude Code enabled remote code execution and API key theft through malicious repository-level configuration files, triggered simply by cloning and opening an untrusted project Built-in mechanisms—including Hooks, MCP integrations, and environment variables—could be…

Medical Device Maker UFP Technologies Hit by Cyberattack

UFP Technologies appears to have been targeted in a ransomware attack that involved data theft and file-encrypting malware. The post Medical Device Maker UFP Technologies Hit by Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

CISA Confirms Active Exploitation of FileZen Vulnerability

U.S. authorities have confirmed that threat actors are actively exploiting a critical vulnerability in FileZen by Soliton Systems K.K.. Due to the high risk associated with this flaw, CISA has officially added it to the Known Exploited Vulnerabilities (KEV) Catalog.…

Hackers Exploit Cortex XDR Live Terminal for C2 Communications

Hackers can repurpose the Cortex XDR Live Terminal feature as a stealthy, EDR‑trusted command‑and‑control (C2) channel, effectively turning a built‑in response tool into a “living off the land” backdoor on protected endpoints. This abuse leverages the agent’s trusted communications and…