Tag: Cybersecurity Threat Advisory

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: CPUID vulnerability

Cybersecurity Threat Advisory: CPUID vulnerability

CPUID has confirmed a software supply chain attack that briefly compromised the official download infrastructure for its popular hardware monitoring tools, CPU‑Z and HWMonitor. During a limited exposure window, attackers manipulated download links on the CPUID website, causing users to...

/ April 20, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Adobe Acrobat Reader zero-day

Cybersecurity Threat Advisory: Adobe Acrobat Reader zero-day

Reports confirm active exploitation of a previously unknown zero‑day vulnerability in Adobe Acrobat Reader since at least December 2025. Attackers are delivering malicious PDF files via phishing and other social engineering methods to achieve remote code execution when the file...

/ April 13, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ransomware turning off EDR with vulnerable drivers

Cybersecurity Threat Advisory: Ransomware turning off EDR with vulnerable drivers

Qilin and Warlock (also known as “Water Manaul”) ransomware groups are using bring your own vulnerable driver (BYOVD) techniques to disable endpoint security tools on Windows systems. These actors can shut down more than 300 EDR drivers across multiple security...

/ April 10, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Storm-1175 exploits zero-days to deploy Medusa ransomware

Cybersecurity Threat Advisory: Storm-1175 exploits zero-days to deploy Medusa ransomware

Storm-1175 is a threat actor using a rapid sequence of zero-day and N-day exploits to deploy Medusa ransomware against internet-facing assets. This high-velocity attack pattern has been highlighted by security researchers, who emphasize the heightened risk posed by exposed perimeter...

/ April 10, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Fortinet SQL injection vulnerability

Cybersecurity Threat Advisory: Active exploitation of Fortinet SQL injection vulnerability

Fortinet has issued urgent security guidance following the active exploitation of a critical SQL injection vulnerability affecting FortiClient Enterprise Management Server (EMS). The flaw allows unauthenticated attackers to achieve remote code execution through specially crafted HTTP requests sent to the...

/ April 6, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Axios NPM compromised by supply chain attack

Cybersecurity Threat Advisory: Axios NPM compromised by supply chain attack

The widely used HTTP client Axios was compromised recently in an incident that many researchers are attributing to a North Korean–linked cyberattack. Attackers gained access to the NPM account of an Axios maintainer, “jasonsaayman,” and published two malicious versions of...

/ April 6, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RoadK1ll Node.js WebSocket implant

Cybersecurity Threat Advisory: RoadK1ll Node.js WebSocket implant

Recent reporting has identified a Node.js–based post-exploitation implant known as RoadK1ll, observed in real-world intrusions as a lateral movement and network pivoting tool. Read this Cybersecurity Threat Advisory to protect you and your clients’ environments. What is the threat? RoadK1ll...

/ April 3, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities

Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities

Apple has released urgent security updates for older iPhones and iPads to address multiple vulnerabilities actively exploited in the wild via the Coruna exploit kit—a sophisticated attack framework used by both espionage groups and cybercriminals. Read this Cybersecurity Threat Advisory...

/ March 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: PureLog Stealer malware campaign

Cybersecurity Threat Advisory: PureLog Stealer malware campaign

A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....

/ March 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Telecoms targeted with new malware

Cybersecurity Threat Advisory: Telecoms targeted with new malware

A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory. What is the...

/ March 26, 2026