Tag: Cybersecurity Threat Advisory

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

Cybersecurity Threat Advisory: “Zombie ZIP” archive evasion technique

A new evasion technique known as Zombie ZIP is exposing blind spots in how security tools scan archived files. By manipulating ZIP metadata, attackers can conceal malware inside archives that appear corrupted but still deliver payloads on compromised systems. Review...

/ March 16, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Cybersecurity Threat Advisory: Apache ZooKeeper vulnerability

Recently, two important‑level severity vulnerabilities were identified in Apache ZooKeeper, a service widely used for configuration management and naming in distributed applications. These issues make timely security updates critical. The vulnerabilities could allow attackers to access sensitive configuration data or...

/ March 13, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

Cybersecurity Threat Advisory: Malware campaign targeting HR workflows

A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering...

/ March 12, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: APT28 targets Windows and Office via MSHTML zero‑day

Cybersecurity Threat Advisory: APT28 targets Windows and Office via MSHTML zero‑day

Multiple security researchers and Microsoft have confirmed that the threat actor APT28 (Fancy Bear / Forest Blizzard) actively exploited a zero‑day vulnerability in the Microsoft MSHTML framework (CVE‑2026‑21513) prior to its fix in the February 2026 Patch Tuesday release. Read...

/ March 4, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Cybersecurity Threat Advisory: PromptSpy Android malware abusing Google Gemini AI

Reported by SecurityWeek on February 20, 2026, PromptSpy is a newly identified Android malware family developed by threat actors. Its standout capability is using Google Gemini at runtime to analyze on‑screen content and help the malware remain installed and active...

/ March 2, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero-day Cisco Catalyst SD-WAN flaw

Cybersecurity Threat Advisory: Zero-day Cisco Catalyst SD-WAN flaw

A critical authentication‑bypass flaw in Cisco Catalyst SD‑WAN, tracked as CVE‑2026‑20127, is being actively exploited as a zero‑day. The vulnerability allows remote attackers to compromise controllers and introduce malicious rogue peers into targeted networks. Review the Cybersecurity Threat Advisory now...

/ February 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware Aria Operations vulnerabilities

Cybersecurity Threat Advisory: VMware Aria Operations vulnerabilities

On February 24, 2026, Broadcom released a critical security advisory addressing three distinct vulnerabilities in VMware Aria Operations. These flaws—ranging from Command Injection to Privilege Escalation—can compromise the confidentiality, integrity, and administrative control of affected systems. Immediate patching is required...

/ February 26, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SolarWinds Serv-U flaw

Cybersecurity Threat Advisory: Critical SolarWinds Serv-U flaw

CVE‑2025‑40538 is a critical broken access control vulnerability in SolarWinds Serv‑U, a self‑hosted managed file transfer (MFT) and FTP/SFTP/FTPS/HTTP(S) server used for secure file exchange. Review the Cybersecurity Threat Advisory now to protect your systems from this critical vulnerability. What...

/ February 25, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Dell RecoverPoint for Virtual Machines zero-day

Cybersecurity Threat Advisory: Dell RecoverPoint for Virtual Machines zero-day

Security researchers from Google Mandiant and the Google Threat Intelligence Group (GTIG) have identified active exploitation of a maximum‑severity zero‑day vulnerability in Dell RecoverPoint for Virtual Machines (RP4VM) by a suspected China‑nexus threat cluster tracked as UNC6201. Read this Cybersecurity...

/ February 23, 2026