ThreatDown Powered by Malwarebytes
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
    • Products

    • Endpoint Detection & Response (EDR)
    • Endpoint Protection
    • Vulnerability Assessment
    • Patch Management
    • Application Block
    • DNS Filtering
    • Mobile Security
    • Services

    • Managed Detection & Response (MDR)
    • Managed Threat Hunting
    • Premium Support
    • Features

    • Browser Phishing Protection
    • Firewall Management
    • Security Advisor
    • Platforms

    • Nebula
    • Manage your organization’s endpoint security in a single-tenant console

      Nebula customer sign in >

    • OneView
    • Provides MSPs centralized visibility and management capabilities across customer sites

      OneView customer sign in >

    • Explore Partnerships
    • Review program benefits, innovative technology, channel first mentality

    • Managed Service Providers
    • Everything MSPs need to run their business seamlessly

    • Technology Partners
    • Explore our technology integrations

    • Resellers
    • Build growth, profitability, and customer loyalty

    • Retain and grow your business with tools, education, and support in the partner experience center.

      Sign in to PXC >

    • Threat Center
    • Learn about the latest threat news

    • Reports
    • Threat Detections
    • Executive POV
    • Glossary
    • Blog
    • Resource Center
    • Learn more about ThreatDown

    • Case Studies
    • Products & Review
    • Cybersecurity Tips & Tricks
    • Webinars
    • About Us
    • Dive into the threats that matter in the year of autonomous AI and “dark horse” ransomware.

      Download now >

    Pricing
    • Why ThreatDown

    • About Us
    • ThreatDown vs. Competition
    • Case Studies
    • ThreatDown named Product of the Year by MRG Effitas.

      Learn more >

    Get a quote
    Buy now
    Home > Blog

    Vulnerabilities

    Update now! Ruckus vulnerability added to CISA’s list of actively exploited bugs

    2 minutes

    [update]Two year old vulnerability used in ransomware attack against VMware ESXi

    Over the last weekend hundreds of VMware ESXi virtual machines were affected by a ransomware attack
    3 minutes

    Update now! Patch Tuesday January 2023 includes one actively exploited vulnerability

    3 minutes

    Initial Access Brokers (IABs): 3 ways they get into corporate networks (and how to stop them)

    6 minutes
    dealing with vulnerabilities

    NSA urges shift to memory safe programming languages

    4 minutes

    Your HP Support Assistant needs an update!

    2 minutes

    Cloud-based malware is on the rise. How can you secure your business?

    6 minutes

    ALPHV squeezes victim with dedicated leak site for employees and customers

    Threat Intelligence Team
    2 minutes

    NGINX zero-day vulnerability: Check if you’re affected

    3 minutes

    How to spot a DocuSign phish and what to do about it

    4 minutes

    How CVSS works: characterizing and scoring vulnerabilities

    Eddie Segal
    6 minutes

    Five years later, Heartbleed vulnerability still unpatched

    Gilad Maayan
    6 minutes

    How threat actors are using SMB vulnerabilities

    8 minutes

    Categories

    Breaches
    Product News
    Ransomware
    Threat Intelligence
    Vulnerabilities
    X (formerly Twitter)

    Posts pagination

    < 1 2 3 4
    ThreatDown Powered by Malwarebytes

    Products & Services

    Endpoint Detection & Response
    Endpoint Protection
    Managed Detection & Response
    Pricing

    Partners

    MSP
    Resellers
    Technology Partners
    Become a Partner

    Resources

    Threat Center
    Resource Center
    Blog
    Glossary

    Managed Services Terms & Conditions

    Managed Service Teams
    MTH Service Description
    MDR Service Description

    Support

    Nebula Support
    OneView Support

    Get in Touch

    Contact Us
    Schedule a Meeting
    Request a Demo

    ThreatDown Newsletter

    Get cybersecurity news and tips from our security experts in your mailbox.

  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2025 All Rights Reserved