Security researchers have discovered a malicious campaign that stores malware in Windows event logs, a technique that has never been publicly described for attacks in the wild. The technology allowed the attacker to plant fileless malware in the file system…
Latest posts - Page 61
DeFi Platform loses more than $2 million
MM. Finance revealed that hackers stole $2 million in digital assets in a Domain Namer System (DNS) attack. These attacks entail hackers targeting the availability or stability of a network’s DNS service. The team at MM.Finance—which claims to be the…
Researchers create an RCE exploit for the latest F5 BIG-IP flaw
Security researchers are warning that they were able to construct an exploit for a serious remote code execution vulnerability affecting F5’s BIG-IP family of devices just days after the company provided patches for the flaw. The weakness, which has been…
Chinese hacker group Mustang Panda executing espionage attacks
Mustang Panda, a China-based threat actor, has been improving and adding tools to attack firms located in Asia, the European Union, Russia, and the U.S. “Mustang Panda is a highly motivated APT group relying primarily on the use of topical…
SharePoint, VPNs, and Virtual Machines are all on Lapsus$’ radar
The NCC Group has released a new report that reveals how Lapsus$ attacks are launched. The report goes into detail about the highly unpredictable attacks’ techniques and tactics, as well as how the group targets its victims. The Lapsus$ attacks…
CISCO releases patches for three flaws plaguing NFVIS software
Cisco systems rolled out patches for three flaws affecting its enterprise NFV Infrastructure Software (NFVIS). The attackers can use the flaw to compromise and take over the controls from users. The flaws labelled CVE-2022-20777, CVE-2022-20779 and CVE-2022-20780, “could allow an…
F5 Security Issues a New BIG-IP Remote Code Execution Vulnerability
F5, a cloud security and application delivery network (ADN) provider, released updates on Wednesday to fix 43 problems across its products. One issue is rated Critical, 17 are rated High, 24 are rated Medium, and one is rated Low in…
Serious flaw plagues dotCMS content management software
A pre-authenticated remote code execution flaw has been revealed in dotCMS, an open-source content management system written in Java and “used by over 10,000 clients in over 70 countries around the globe, from Fortune 500 brands and mid-sized businesses.” The…
Sting BazarLoader has been buzzed with bumblebee.
Proofpoint has identified a new malware loader known as Bumblebee. At least three different threat clusters tied to ransomware operations employ the loader. More details Bumblebee was most likely created by the Conti gang to replace the BazarLoader backdoor (aka…
IoT devices plagued by unpatched vulnerability affecting DNS
Cybersecurity researchers have uncovered an unpatched flaw that could be a potential threat to IoT products. The flaw, originally reported in September 2021, plagues the Domain Name System (DNS) implementation of two well-known C libraries called uClibc and uClibc-ng that…