Log4j
-
Researchers Find New Malware Attacks Targeting Russian Government Entities
An unknown advanced persistent threat (APT) group has been linked to a series of spear-phishing attacks targeting Russian government entities…
Read More » -
Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor
The North Korea-backed Lazarus Group has been observed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the NukeSped…
Read More » -
Google Created ‘Open-Source Maintenance Crew’ to Help Secure Critical Projects
Google on Thursday announced the creation of a new “Open Source Maintenance Crew” to focus on bolstering the security of…
Read More » -
AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection
Cybersecurity researchers have disclosed a new variant of the AvosLocker ransomware that disables antivirus solutions to evade detection after breaching…
Read More » -
Amazon’s Hotpatch for Log4j Flaw Found Vulnerable to Privilege Escalation Bug
The “hotpatch” released by Amazon Web Services (AWS) in response to the Log4Shell vulnerabilities could be leveraged for container escape…
Read More » -
Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit
A Chinese advanced persistent threat tracked as Deep Panda has been observed exploiting the Log4Shell vulnerability in VMware Horizon servers…
Read More » -
Of Cybercriminals and IP Addresses
You don’t like having the FBI knocking on your door at 6 am in the morning. Surprisingly, nor does your…
Read More » -
Muhstik Botnet Targeting Redis Servers Using Recently Disclosed Vulnerability
Muhstik, a botnet infamous for propagating via web application exploits, has been observed targeting Redis servers using a recently disclosed…
Read More » -
New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet…
Read More » -
Why Enterprise Threat Mitigation Requires Automated, Single-Purpose Tools
As much as threat mitigation is to a degree a specialist task involving cybersecurity experts, the day to day of…
Read More »