Third Party Risk Assessment

Third Party Risk Assessment
Python Backdoor Compromised PyPI Several OS Windows MacOS

Python backdoor can be opened by compromised PyPI on several OS

May 31, 2022

A malicious Python backdoor has been discovered by researchers in…

Security Analysts DuckDuckGo Microsoft User Tracking Dark Web Search Engine

Analysts discovered DuckDuckGo allowing Microsoft to track users

May 30, 2022

The popular search engine DuckDuckGo, which has claimed maximum browsing…

Third Party Trackers Logging User Data Website Forms

Third-party trackers discovered logging user data from site forms

May 20, 2022

About 100,000 top-ranking websites have recently been examined by security…

CERT-IN User Data Incident Report Threat Analysis India VPN ISP Policy Enforcement

CERT-IN to collect user data aiming to solve incident analysis issues

May 19, 2022

India has recently mandated all internet service providers to gather…

Log4j Flaw Vulnerability Expose Devices Cyberattacks

The Log4j flaw still exposes thousands of devices to cyberattacks

May 6, 2022

Several months after security analysts found the critical zero-day flaw…

Third Party Vendor Antivirus Flaw Vulnerability Virus Total RCE Exploit Patched

A third-party AV flaw on VirusTotal triggering RCE exploit gets patched

May 5, 2022

A security flaw was found within Google’s VirusTotal platform, allowing…

HOMAGE Vulnerability Exploit iOS Catalan Pegasus Spyware

HOMAGE exploit discovered targeting iOS users from Catalan

April 25, 2022

Catalan-based journalists, politicians, and activists are the newest targets of…

JSSLoader Microsoft Excel Add-Ins Bypass Security Detection

JSSLoader utilised MS Excel add-ins to bypass security detection

April 4, 2022

The JSSLoader remote access trojan (RAT) propagates using Microsoft Excel…

Hackers Remote Access Software Phishing Campaigns Email VNC noVNC Evilginx2

Hackers used remote access software for phishing campaigns

March 8, 2022

A new phishing strategy enables threat actors to bypass the…

Google Drive Attack Vector Malicious Downloads Malware Scripts Cloud Services Brand Abuse

Google Drive has become the most efficient vector for malicious downloads

March 1, 2022

Recent reports revealed how Google Drive became the most exploited…