Tag: EN

Top open source and commercial threat intelligence feeds

<p>Cybersecurity threat intelligence feeds play an important role in security. They detail current attacks and their sources. These characteristics, better known as <a href=”https://www.techtarget.com/searchsecurity/definition/Indicators-of-Compromise-IOC”>indicators of compromise</a>, include, among other factors, IP addresses, domain names, URLs, email addresses, malware file hashes…

PhantomVAI Custom Loader Uses RunPE Utility to Attack Users

A sophisticated custom loader named PhantomVAI has emerged in global phishing campaigns, delivering various stealers and remote access trojans (RATs) to compromised systems. This malware loader operates by masquerading as legitimate software and employing process hollowing techniques to inject malicious…

Critical SolarWinds Web Help Desk bug under attack

US agencies told to patch by Friday Attackers are exploiting a critical SolarWinds Web Help Desk bug – less than a week after the vendor disclosed and fixed the 9.8-rated flaw. That’s according to America’s lead cyber-defense agency, which set…

Managed SaaS Threat Detection | AppOmni Scout

AppOmni Scout – Managed Threat Detection Service Expertise to detect SaaS and AI threats and protect your critical data SaaS and AI threat detection led by threat experts Security teams don’t have the resources for timely detection to protect critical…

Detecting backdoored language models at scale

We’re releasing new research on detecting backdoors in open-weight language models and highlighting a practical scanner designed to detect backdoored models at scale and improve overall trust in AI systems. The post Detecting backdoored language models at scale appeared first…

Federal Agencies Worldwide Hunt for Black Basta Ransomware Leader

International operation to catch Ransomware leader  International law enforcement agencies have increased their search for individuals linked to the Black Basta ransomware campaign. Agencies confirmed that the suspected leader of the Russia-based Ransomware-as-a-service (RaaS) group has been put in the…

Critical ASUSTOR NAS Security Flaw Enables Complete Device Takeover

A severe vulnerability affecting ASUSTOR Network Attached Storage (NAS) devices has been disclosed, potentially allowing unauthenticated attackers to seize full control of affected systems. Tracked as CVE-2026-24936, this critical flaw carries a CVSS v4.0 base score of 9.5, highlighting the urgency for…