shells
-
Hackers Targeting VoIP Servers By Exploiting Digium Phone Software
VoIP phones using Digium’s software have been targeted to drop a web shell on their servers as part of an…
Read More » -
Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers
A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal…
Read More » -
APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor
Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange…
Read More » -
Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability
Atlassian has warned of a critical unpatched remote code execution vulnerability impacting Confluence Server and Data Center products that it…
Read More » -
Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks
A ransomware group with an Iranian operational connection has been linked to a string of file-encrypting malware attacks targeting organizations…
Read More » -
Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability
Days after F5 released patches for a critical remote code execution vulnerability affecting its BIG-IP family of products, security researchers…
Read More » -
New Incident Report Reveals How Hive Ransomware Targets Organizations
A recent Hive ransomware attack carried out by an affiliate involved the exploitation of “ProxyShell” vulnerabilities in the Microsoft Exchange…
Read More » -
Microsoft Exposes Evasive Chinese Tarrask Malware Attacking Windows Computers
The Chinese-backed Hafnium hacking group has been linked to a piece of a new malware that’s used to maintain persistence…
Read More » -
New “SockDetour” Fileless, Socketless Backdoor Targets U.S. Defense Contractors
Cybersecurity researchers have taken the wraps off a previously undocumented and stealthy custom malware called SockDetour that targeted U.S.-based defense…
Read More » -
Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor
An Iranian state-sponsored actor has been observed scanning and attempting to abuse the Log4Shell flaw in publicly-exposed Java applications to…
Read More »