Tag: exploitation

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered

Cybersecurity Threat Advisory: Updated Bumblebee malware loader discovered

Today’s Cybersecurity Threat advisory discusses the update to the popular Bumblebee malware loader that increases its defense evasion capabilities. The loader is commonly distributed via “.lnk” (softlink/shortcut) files attached to an email or compressed in a .zip archive attached to...

/ September 21, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls   

Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls   

Today’s Cybersecurity Threat Advisory involves proof-of-concept exploit code that has been publicly released in Juniper SRX firewalls. Using the proof-of-concept exploit code can allow unauthenticated attackers access to remotely execute code in unpatched Juniper JunOS devices. This news comes after...

/ August 30, 2023