Hackers are luring unsuspecting users with a fake Windows 11 upgrade that comes with malware that steals browser data and cryptocurrency wallets. […]
Category: Uncategorized
Windows 10 21H2 now in broad deployment, available to everyone
Microsoft says Windows 10, version 21H2 (aka the November 2021 Update) is now designated for broad deployment, making it available to everyone via Windows Update. […]
Beanstalk DeFi platform loses $182 million in flash-loan attack
The decentralized, credit-based finance system Beanstalk disclosed on Sunday that it suffered a security breach that resulted in financial losses of $182 million, the attacker stealing $80 million in crypto assets. […]
Customize your Windows 11 experience with these apps
Windows 11 is now available with a long list of limitations and missing features. The big feature update is currently available for download as an optional update and if you’ve already upgraded to the new operating system, you can try the third-party programs highlighted below. […]
Microsoft: Office 2013 will reach end of support in April 2023
Microsoft has reminded customers this week that Microsoft Office 2013 is approaching its end of support next year, advising to switch to a newer version to reduce their exposure to security risks. […]
Gaining Visibility Within Container Clusters
Service mesh platforms can be used to provide insight into the container processes and their network operations within K8s clusters.
The post Gaining Visibility Within Container Clusters appeared first on Unit42.
IAM Your Defense Against Cloud Threats: The Latest Unit 42 Cloud Threat Research
We present research highlights and recommendations for defense against cloud threats from Unit 42’s Cloud Threat Report: IAM the First Line of Defense
The post IAM Your Defense Against Cloud Threats: The Latest Unit 42 Cloud Threat Research appeared first on Unit42.
Trends in Web Threats: Attackers Were More Active During Holiday Season
We analyzed hundreds of thousands of incidents of malicious host URLs in order to identify recent trends in web threats, what they target and how.
The post Trends in Web Threats: Attackers Were More Active During Holiday Season appeared first on Unit42.
New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns
A new version of SolarMarker malware appears to upgrade evasion abilities and demonstrates that the infostealer and backdoor continues to evolve.
The post New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns appeared first on Unit42.
CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated)
CVE-2022-22965, aka SpringShell, is a remote code execution vulnerability in the Spring Framework. We provide a root cause analysis and mitigations.
The post CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated) appeared first on Unit42.