-
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
Source: Unit 42 Published on 2024-04-13 By Unit 42
-
Muddled Libra’s Evolution to the Cloud
Source: Unit 42 Published on 2024-04-10 By Margaret Zimmermann
-
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
Source: Unit 42 Published on 2024-04-09 By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer
-
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094)
Source: Unit 42 Published on 2024-03-31 By Unit 42
-
Exposing a New BOLA Vulnerability in Grafana
Source: Unit 42 Published on 2024-03-27 By Ravid Mazon and Jay Chen
-
Investigating industrial control systems using Microsoft’s ICSpector open-source framework
Source: Blog from Microsoft Security Published on 2024-04-26 By Maayan Shaul
-
5 ways a CNAPP can strengthen your multicloud security environment
Source: Blog from Microsoft Security Published on 2024-04-25 By Vlad Korsunsky
-
New Microsoft Incident Response guide helps simplify cyberthreat investigations
Source: Blog from Microsoft Security Published on 2024-04-24 By Microsoft Incident Response
-
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
Source: Blog from Microsoft Security Published on 2024-04-23 By Microsoft Threat Intelligence
-
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
Source: Blog from Microsoft Security Published on 2024-04-18 By Microsoft Threat Intelligence
-
CEO who sold fake Cisco devices to US military gets 6 years in prison
Source: BleepingComputer Published on 2024-05-03 By Sergiu Gatlan
-
Bitwarden launches new MFA Authenticator app for iOS, Android
Source: BleepingComputer Published on 2024-05-03 By Bill Toulas
-
CISA urges software devs to weed out path traversal vulnerabilities
Source: BleepingComputer Published on 2024-05-03 By Sergiu Gatlan
-
Police shuts down 12 fraud call centres, arrests 21 suspects
Source: BleepingComputer Published on 2024-05-03 By Sergiu Gatlan
-
Microsoft warns of "Dirty Stream" attack impacting Android apps
Source: BleepingComputer Published on 2024-05-03 By Bill Toulas
-
Managed Detection and Response in 2023
Source: Securelist Published on 2024-04-30 By Kaspersky Security Services
-
Assessing the Y, and How, of the XZ Utils incident
Source: Securelist Published on 2024-04-24 By GReAT
-
ToddyCat is making holes in your infrastructure
Source: Securelist Published on 2024-04-22 By Andrey Gunkin, Alexander Fedotov, Natalya Shornikova
-
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware
Source: Securelist Published on 2024-04-18 By GReAT
-
SoumniBot: the new Android banker’s unique techniques
Source: Securelist Published on 2024-04-17 By Dmitry Kalinin
-
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Source: The Hacker News Published on 2024-05-02
-
Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million
Source: The Hacker News Published on 2024-05-02
-
When is One Vulnerability Scanner Not Enough?
Source: The Hacker News Published on 2024-05-02
-
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
Source: The Hacker News Published on 2024-05-02
-
New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw
Source: The Hacker News Published on 2024-05-02
-
From IcedID to Dagon Locker Ransomware in 29 Days
Source: The DFIR Report Published on 2024-04-29 By editor
-
From OneNote to RansomNote: An Ice Cold Intrusion
Source: The DFIR Report Published on 2024-04-01 By editor
-
Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE
Source: The DFIR Report Published on 2024-03-04 By editor
-
SEO Poisoning to Domain Control: The Gootloader Saga Continues
Source: The DFIR Report Published on 2024-02-26 By editor
-
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Source: The DFIR Report Published on 2024-01-29 By editor