Technical Details, IoCs Available for Actively Exploited BIG-IP Vulnerability

Indicators of compromise (IoCs) and other resources have been released to help defenders deal with the actively exploited F5 BIG-IP vulnerability tracked as CVE-2022-1388.
read more

Continue reading Technical Details, IoCs Available for Actively Exploited BIG-IP Vulnerability

Chinese Hackers Abuse Cybersecurity Products for Malware Execution

Researchers at cybersecurity firm SentinelOne have observed a Chinese hacking group taking a trial-and-error approach to abusing antivirus applications for the sideloading of malicious DLLs.
read more

Continue reading Chinese Hackers Abuse Cybersecurity Products for Malware Execution

1.2 Million Bad Apps Blocked From Reaching Google Play in 2021

Google claims that it prevented 1.2 million bad applications from reaching Google Play in 2021, but cybercriminals are still finding ways to deliver malware through the official Android app store.
read more

Continue reading 1.2 Million Bad Apps Blocked From Reaching Google Play in 2021

4-Hour Time-to-Ransom Seen in Quantum Attack as Accelerated Ransomware Increasingly Common

As part of a recent cyberattack, threat actors deployed ransomware less than four hours after compromising the victim’s environment, according to researchers with The DFIR Report.
read more

Continue reading 4-Hour Time-to-Ransom Seen in Quantum Attack as Accelerated Ransomware Increasingly Common