Tag: EN

Fake e-Shop scams — How cybercriminals are cashing it in

Our researchers first detected a surge in fake e-shop scams preying on bargain-hunting consumers during Black Friday and Christmas shopping sprees. However, just because the holiday season ended, doesn’t mean that shoppers are off the hook.   This article has been…

Heimdal Awarded Patent for Predictive DNS™ Technology

COPENHAGEN, Denmark, April 23, 2025 – Heimdal, a leading European cybersecurity company, today announced that it has been granted U.S. Patent No. 18333620 for a pioneering invention that calculates the probability of a domain being malicious. This milestone reinforces Heimdal’s…

Armis expands vulnerability exposure and assessment capabilities

Armis is expanding its vulnerability exposure and assessment capabilities with the free availability of the Armis Vulnerability Intelligence Database. The community-driven database integrates exploited vulnerabilities, emerging threats and AI-powered insights, providing the cybersecurity industry with the knowledge organizations need to…

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed, enabling attackers to execute unauthorized code and trigger persistent denial-of-service (DoS) conditions. The flaw, rated high severity, impacts tamper protection mechanisms in FireEye’s HX service…

Heimdal Awarded Patent for Predictive DNS™ Technology

COPENHAGEN, Denmark, April 23, 2025 – Heimdal, a leading European cybersecurity company, today announced that it has been granted U.S. Patent No. 18333620 for a pioneering invention that calculates the probability of a domain being malicious. This milestone reinforces Heimdal’s…

New Malware Hijacking Docker Images with Unique Obfuscation Technique

A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique to evade detection and hijack compute resources for cryptojacking. Security researchers from Darktrace and Cado Security Labs have analyzed this campaign, revealing both the technical…

NinjaOne unifies vulnerability and patch management

NinjaOne announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so…

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs

MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. About MITRE ATT&CK MITRE ATT&CK is a regularly…