Tag: exploitation
Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered
Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered
Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to...
Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls
Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls
Today’s Cybersecurity Threat Advisory involves proof-of-concept exploit code that has been publicly released in Juniper SRX firewalls. Using the proof-of-concept exploit code can allow unauthenticated attackers access to remotely execute code in unpatched Juniper JunOS devices. This news comes after...