Sysrv-K Botnet Targets Windows, Linux
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins. Continue reading Sysrv-K Botnet Targets Windows, Linux
Collaborate Disseminate
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins. Continue reading Sysrv-K Botnet Targets Windows, Linux
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks. Continue reading Malware Builder Leverages Discord Webhooks
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains. Continue reading Novel Phishing Trick Uses Weird Links to Bypass Spam Filters
The bug has a severe rating of 9.8, public exploits are released. Continue reading Hackers Actively Exploit F5 BIG-IP Bug
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem. Continue reading FBI: Rise in Business Email-based Attacks is a $43B Headache
Activity dubbed ‘Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands. Continue reading USB-based Wormable Malware Targets Windows Installer
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said. Continue reading VHD Ransomware Linked to North Korea’s Lazarus Group
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data. Continue reading China-linked APT Caught Pilfering Treasure Trove of IP
A sophisticated campaign utilizes a novel anti-detection method. Continue reading Attackers Use Event Logs to Hide Fileless Malware
The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets. Continue reading Cyberespionage APT Now Identified as Three Separate Actors