Sophisticated iLOBleed Rootkit Targets HP Servers
An Iranian cybersecurity firm claims to have discovered a sophisticated rootkit that is designed to target HP servers.
read more
Continue reading Sophisticated iLOBleed Rootkit Targets HP Servers
Collaborate Disseminate
An Iranian cybersecurity firm claims to have discovered a sophisticated rootkit that is designed to target HP servers.
read more
Continue reading Sophisticated iLOBleed Rootkit Targets HP Servers
Recently observed malicious campaigns have abused Microsoft Build Engine (MSBuild) to execute a Cobalt Strike payload on compromised machines.
read more
Continue reading Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution
A piece of ransomware that emerged in late November has already made three victims, with the first of them hit less than a week after the malware was initially spotted.
read more
Continue reading Organizations Targeted With Babuk-Based Rook Ransomware
Cybercriminals have found a way to bypass the patch for a recent Microsoft Office vulnerability and leveraged it to briefly distribute Formbook malware, Sophos reports.
read more
Continue reading Microsoft Office Patch Bypassed for Malware Distribution in Apparent ‘Dry Run’
China’s Ministry of Industry and Information Technology (MIIT) said it will temporarily suspend its collaboration with Alibaba Cloud as a cyber threat intelligence partner due to the fact that the company did not inform the government first about the d… Continue reading Chinese Government Punishes Alibaba for Not Telling It First About Log4Shell Flaw: Report
PYSA and Lockbit were the dominating threats in the ransomware landscape in November 2021, UK-based risk mitigation company NCC Group reports.
read more
Continue reading PYSA Dominated the Ransomware Landscape in November: Report
The Federal Bureau of Investigation (FBI) has released an alert regarding the exploitation of a recent vulnerability in Zoho’s ManageEngine Desktop Central product.
read more
Continue reading FBI Sees APTs Exploiting Recent ManageEngine Desktop Central Vulnerability
Over the past five years, the Phorpiex botnet has managed to hijack approximately 3,000 cryptocurrency transactions, stealing at least hundreds of thousands of dollars, Check Point says.
read more
Continue reading Phorpiex Botnet Hijacked 3,000 Cryptocurrency Transactions
Log4Shell Attacks Can Be Launched by Luring Targets to Malicious Website
read more
Continue reading MobileIron Users Targeted in Log4Shell Attacks as Exploit Activity Surges