Cyber Threat Pulse

Your Cybersecurity Alert 

  • Illustration

    News №13

    In this edition:
    1. Fortinet vulnerabilities: attackers retain access after official patches 2. Infostealers for MacOS: analyzing the Atomic Stealer attack3. Leaked conversations of Black Basta, one of the Russian ransomware groups 4. Major threats and vulnerabilities (April 2025) 

  • Illustration

    News №12

    In this edition:
    1. PAN-OS Critical Vulnerabilities (CVE-2024-0012 and CVE-2024-9474): How attackers bypass authentication and gain root firewall access.
    2. RDP Phishing by Midnight Blizzard (APT29): A large-scale campaign against governments and the defense sector.
    3. Avast driver abuse: an example of BYOVD attacks that bypass protection.
    4. It's time to update your systems. Microsoft, Google Chrome, Mozilla, Apple, and Android have patched critical vulnerabilities. 

  • Illustration

    News №11

    In this edition:
    1. Which malicious campaign is targeting software developers  2. Who is at risk 3. What's wrong with the Windows 11 update KB5043145 release
    4. What happened to the Kryptina ransomware   
    5. What updates have Microsoft, Adobe, Google Chrome, Mozilla Firefox and Fortra FileCatalyst introduced  

  • Illustration

    News №10

    In this edition:
    1. Russian Hackers from APT29 Use Exploits from NSO Group and Intellexa   2. Disguised as Palo Alto Networks   3. Microsoft and Vulnerability Related to IPv64. It's Time to Update! 

  • Illustration

    News №9

    In this edition:
    1. What techniques hackers used after the CrowdStrike failure 2. How the new regreSSHion vulnerability affects OpenSSH 3. What updates were released by Microsoft, Google Chrome, Mozilla Firefox, and Android 

  • Illustration

    News №8

    In this edition:
    1. New Scam: Hackers Steal Telegram and WhatsApp Accounts   2. Russian and Chinese Hacker Activity on the Rise: New Trellix report   3. Vulnerabilities in ASUS Routers: Millions of Devices are at Risk4. It's Time to Update! 

  • Illustration

    News №7

    In this edition:
    1. What the critical vulnerability CVE-2024-31497 is, and which versions of PuTTY are at risk
    2. What vulnerability was discovered in Palo Alto Networks Pan-OS  
    3. The most important things about the backdoor in XZ Utils  4. What updates have Microsoft, Apple ,Adobe, VMware released? 

  • Illustration

    News №6

    In this edition:
    1. Weak Security Leaves Microsoft Exposed: Russian Espionage Continues 2. Misconfiguration Manager: a tool to improve MCM security (SCCM)  3. What updates have Microsoft, Apple ,Adobe, VMware released? 

  • Illustration

    News №5

    In this edition:
    1. UAC-0149: New cyber attack against Ukrainian defense forces exposed 2. Active use of Ivanti products 3. Russian hackers attack email servers of European governments and military organizations 4. What updates have Microsoft, Adobe, Oracle, and Chrome released? 

  • Illustration

    News №4

    In this edition:
    1. How RemcosRAT and QuasarRAT continue to spread via email
    2. How to protect yourself from 9 new vulnerabilities in UEFI firmware that threaten millions of computers and servers
    3. How caching of security products is used as a new technique for avoiding phishing attacks
    4. What updates have Microsoft, Adobe, Oracle, and Chrome released? 

  • Illustration

    News №3

    In this edition:
    1. Pro-Russian hackers exploit Outlook to hack email accounts 2. Phishing emails on behalf of the SBU (Security Service of Ukraine): CERT-UA study 3. "It's time to update" column- "It's time to update" column- Critical RCE vulnerability in Struts 2 - WordPress update fixes a critical vulnerability  

  • Illustration

    News №2

    In this edition:
    1. Google Calendar – the new cybersecurity threat
    2. Specific features of attacks on telecommunications providers
    3. Pro-Russian APT group exploits a new vulnerability to bypass Microsoft security feature
    4. Monthly cyber threat overview from Picus Security 

  • Illustration

    News №1

    In this edition:

    1. Vulnerability in WebP puts numerous applications at risk
    2. CVE-2023-26369: Active exploitation of Adobe products
    3. CVE-2023-27470: System compromise via file deletion
    4. Research of Turla tools

В1 Department

BAKOTECH's B1 department specializes in information and cybersecurity solutions. 
Our team consists of highly qualified, certified specialists who have practical experience in implementing and optimizing security technologies.
We help our customers and partners at every stage: from selecting a solution to meet their needs to implementation and post-sales technical support.

Vendors' portfolio

Illustration

XDR cybersecurity platform

Illustration

Data and infrastructure protection

Illustration

Breach and attack simulation

Illustration

Vulnerability management

Illustration

NextGen network security platform

Illustration

UES and UEM solutions

Illustration

Innovative endpoint protection XDR

Illustration

Security and control of OT and IOT

Illustration

Protecting industrial networks

Do you have any questions for our experts?

Fill out the form and our specialists will contact you within 2 business days.