![wireless router](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/02150658/wireless-router-400x200.webp)
New SOHO router malware aims for cloud accounts, internal company resources
Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/12084248/cisco-neon1-400x200.jpg)
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
A state-sponsored threat actor has managed to compromise Cisco Adaptive Security Appliances (ASA) used on government networks across the globe and use two zero-day …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Lumen Data Protect defends critical business data from corruption
Lumen is introducing Lumen Data Protect, a service for companies battling the growing risks associated with data corruption and security failure. Lumen Data Protect is an …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102623/skull-400x200.jpg)
Qakbot: The trojan that just won’t go away
Qakbot (aka Qbot) – banking malware-turned-malware/ransomware distribution network – has been first observed in 2007 and is active to this day. The neverending …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/06165642/router-1600-400x200.jpg)
Business-grade routers compromised in low-key attack campaign
An unknown threat actor has discreetly compromised business-grade DrayTek routers in Europe, Latin and North America, equipping them with a remote access trojan (dubbed …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01144104/malware_2_01122021-400x200.jpg)
Multi-platform Chaos malware threatens to live up to its name
Chaos, new multipurpose malware written in the Go programming language, is spreading across the world. “We are seeing a complex malware that has quadrupled in size in just two …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Lumen SASE Solutions centralize network and security policy management
With today’s highly distributed workforce, IT and security leaders can no longer operate effectively using the rigid network and security approaches of the past. That is …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100046/router-400x200.jpg)
Researchers uncover ZuoRAT malware targeting home-office routers
Black Lotus Labs discovered a new remote access trojan (RAT) called ZuoRAT, which targets remote workers via their small office/home office (SOHO) devices, including models …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/26092523/world_1200-400x200.jpg)
Swimlane expands into the APJ region to address ongoing cybersecurity challenges
Swimlane announced the general availability of Swimlane Cloud in the Asia-Pacific Japan (APJ) region. This deployment is further evidence of Swimlane’s continued commitment to …
Lumen expands its fiber network in Europe to strengthen its service capabilities
As the 4th Industrial Revolution continues to accelerate business demand for high-speed broadband and presence in the cloud, Lumen Technologies has expanded its fiber network …
Morpheus Data announces new channel investments to enhance service delivery capabilities
Morpheus Data has signed on a record number of leading systems integrators, service providers, and channel partners to its roster in the last 12 months and is doubling channel …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Microsoft and partners cut off key Trickbot botnet infrastructure
Two weeks after someone (allegedly the US Cyber Command) temporarily interrupted the operation of the infamous Trickbot botnet, a coalition of tech companies headed by …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD