Log4j
-
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that…
Read More » -
Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking
Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it…
Read More » -
Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers
A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations…
Read More » -
North Korean Hacker Group Andariel Strikes with New EarlyRat Malware
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in phishing attacks, adding another…
Read More » -
The Different Methods and Stages of Penetration Testing
Penetration Testing / Cyber Security The stakes could not be higher for cyber defenders. With the vast amounts of sensitive…
Read More » -
3 Overlooked Cybersecurity Breaches
Here are three of the worst breaches, attacker tactics and techniques of 2022, and the security controls that can provide…
Read More » -
Google Launches Largest Distributed Database of Open Source Vulnerabilities
Dec 13, 2022Ravie LakshmananOpen Source / Vulnerability Database Google on Tuesday announced the open source availability of OSV-Scanner, a scanner…
Read More » -
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver
Dec 09, 2022Ravie Lakshmanan The subgroup of an Iranian nation-state group known as Nemesis Kitten has been attributed as behind…
Read More » -
Iranian Hackers Compromised a U.S. Federal Agency’s Network Using Log4Shell Exploit
Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of the Log4Shell vulnerability…
Read More » -
Last Years Open Source – Tomorrow’s Vulnerabilities
Linus Torvalds, the creator of Linux and Git, has his own law in software development, and it goes like this:…
Read More »