Resource Center
Resource Center
Expert Insights and Tools for Fortifying Your Cyber Defense
Elevate your cybersecurity expertise and strengthen the security posture of your organization with expert guidance, industry best practices, and research insights from Enterprotect.
New Microsoft Word Vulnerability CVE-2023-36761
Enterprotect's latest threat advisory highlights the recent Microsoft Word vulnerability, CVE-2023-36761. Learn about the threat, its significance, potential risks, and our expert recommendations to safeguard your organization.
Critical Zero-Day Vulnerability in libwebp Image Library
A comprehensive advisory on the recent zero-day vulnerability (CVE-2023-5129) in the libwebp image library, detailing its threat, significance, risks, and Enterprotect's expert recommendations for mitigation.
Earth Lusca's SprySOCKS Linux Backdoor Targets Governments
Dive into the details of the SprySOCKS Linux backdoor, a new threat from the Earth Lusca group targeting government entities. Learn about its origins, risks, and Enterprotect's recommendations for defense.
Updated Bumblebee Malware Loader with Enhanced Evasion Capabilities
Enterprotect's latest threat advisory highlights the updated Bumblebee malware loader, detailing its enhanced evasion techniques and providing recommendations to mitigate risks.
BlackCat Ransomware Targets Microsoft Azure Storage
Enterprotect's latest threat advisory highlights the BlackCat ransomware's targeting of Microsoft Azure storage. Learn about the threat, its significance, potential risks, and our expert recommendations to safeguard your organization.
Critical Zero-Day Vulnerability in Adobe Acrobat and Reader
Enterprotect's advisory on the recent critical zero-day vulnerability detected in Adobe Acrobat and Reader, detailing the threat, its significance, exposure risks, and our expert recommendations for mitigation.
“File Archiver in the Browser” Exploits - Protect Yourself from Deceptive ZIP Domains
Protect yourself from the emerging "File Archiver in the Browser" phishing trick that exploits ZIP domains. Learn about the risks, significance, and recommended safeguards provided by Enterprotect to enhance your cybersecurity defenses against this deceptive threat.
Fortinet SSL VPN RCE Vulnerability - Patches Released
Discover the critical Fortinet SSL VPN RCE vulnerability, its potential risks, and how to safeguard your network. Learn about the recommended patches and security measures to protect your organization's data.
Critical Vulnerability Discovered in FortiNAC
Protect your network from the critical FortiNAC vulnerability (CVE-2023-33299) with actionable recommendations. Safeguard against unauthorized access and code execution by applying updates, segmenting networks, and following least privilege. Stay informed and mitigate the risk.
Command Injection Flaw in Zyxel NAS Devices
Discover the critical vulnerabilities in Zyxel NAS devices and get actionable recommendations from Enterprotect to enhance your network security and protect your organization from potential threats.
Global Cybersecurity Advisory Breakdown: The Threat of Volt Typhoon
Discover key insights from a multi-national cybersecurity advisory on the threat posed by Volt Typhoon. This article summarizes the advisory, highlighting the threat's nature, its potential impact, and offers expert recommendations for enhancing your cybersecurity defenses.
AWS Exploited for Crypto Mining Operation
Protect your organization from the exploitation of Amazon Web Services (AWS) for illicit crypto mining activities. Learn about the GUI-vil threat group and their unique attack methods. Discover the risks involved and get actionable recommendations from Enterprotect on how to secure your cloud environment effectively.
Critical Zero-Day Vulnerability in MOVEit Transfer Exploited in the Wild
3 New Apple Zero-Day Vulnerabilities in WebKit Exploited
Stay informed about the latest Apple zero-day vulnerabilities and learn how to protect your devices. This advisory provides a comprehensive analysis of three zero-day vulnerabilities in WebKit, along with their associated CVEs, and offers essential recommendations to safeguard your Apple products.
Cisco Small Business Switches Remote Attack Vulnerabilities
Protect your organization from remote attack vulnerabilities in Cisco Small Business Switches. Learn about the latest threat advisory, its risks, and recommended actions to secure your network infrastructure. Stay ahead of potential data breaches and unauthorized access.
Escalating CACTUS Ransomware Group Targets SMBs with Advanced Techniques
Discover the escalating threat of the CACTUS ransomware group targeting SMBs with advanced techniques. Stay informed about their new variant, evasive tactics, and the risks they pose to organizations. Stay vigilant and protect your SMB against CACTUS ransomware attacks.
Qakbot Leveraging Compromised Websites for Initial Infiltration
Learn about the rise of Qakbot as an initial access threat, its techniques, and the risks it poses. Find out how Enterprotect recommends protecting your network and mitigating the impact of Qakbot.
Critical PaperCut MF and NG Vulnerability Actively Exploited
Stay one step ahead of cyber threats with our in-depth threat advisory on the critical PaperCut vulnerability (CVE-2023-27350). Discover the risks posed by this exploit, its impact on organizations, and actionable recommendations from Enterprotect to mitigate the risk.
EvilExtractor Malware Spikes in Europe and the US
Stay informed and protect your organization from the rapidly spreading EvilExtractor malware, a stealthy threat targeting sensitive data. Discover risks, exposures, and Enterprotect's expert recommendations in this comprehensive threat advisory.
Supply Chain Attack Compromises 3CXDesktopApp
The compromise of 3CXDesktopApp poses a significant threat to businesses globally, as it has the potential to steal credentials and access sensitive data. Our threat advisory outlines the technical details of the malware, exposure risks, and recommendations to protect your organization from potential breaches. Ensure endpoint protection is installed and active on all endpoints, remove any exclusions related to 3CX, and regularly remind users not to store login credentials in their browsers.