-
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
Source: Unit 42 Published on 2024-04-13 By Unit 42
-
Muddled Libra’s Evolution to the Cloud
Source: Unit 42 Published on 2024-04-10 By Margaret Zimmermann
-
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
Source: Unit 42 Published on 2024-04-09 By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer
-
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094)
Source: Unit 42 Published on 2024-03-31 By Unit 42
-
Exposing a New BOLA Vulnerability in Grafana
Source: Unit 42 Published on 2024-03-27 By Ravid Mazon and Jay Chen
-
How Microsoft discovers and mitigates evolving attacks against AI guardrails
Source: Blog from Microsoft Security Published on 2024-04-12 By Mark Russinovich
-
Explore Microsoft’s AI innovations at RSA Conference 2024
Source: Blog from Microsoft Security Published on 2024-04-05 By Dasha Zenkovich
-
Get end-to-end protection with Microsoft’s unified security operations platform, now in public preview
Source: Blog from Microsoft Security Published on 2024-04-04 By Rob Lefferts
-
Microsoft Priva announces new solutions to help modernize your privacy program
Source: Blog from Microsoft Security Published on 2024-04-02 By Herain Oberoi and Paul Brightmore
-
The foundation for responsible analytics with Microsoft Purview
Source: Blog from Microsoft Security Published on 2024-03-26 By Rohan Kumar
-
LabHost phishing service with 40,000 domains disrupted, 37 arrested
Source: BleepingComputer Published on 2024-04-18 By Bill Toulas
-
SoumniBot malware exploits Android bugs to evade detection
Source: BleepingComputer Published on 2024-04-18 By Bill Toulas
-
Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks
Source: BleepingComputer Published on 2024-04-18 By Sergiu Gatlan
-
FIN7 targets American automaker’s IT staff in phishing attacks
Source: BleepingComputer Published on 2024-04-18 By Bill Toulas
-
Moldovan charged for operating botnet used to push ransomware
Source: BleepingComputer Published on 2024-04-18 By Sergiu Gatlan
-
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware
Source: Securelist Published on 2024-04-18 By GReAT
-
SoumniBot: the new Android banker’s unique techniques
Source: Securelist Published on 2024-04-17 By Dmitry Kalinin
-
Using the LockBit builder to generate targeted ransomware
Source: Securelist Published on 2024-04-15 By Eduardo Ovalle, Francesco Figurelli, Cristian Souza, Ashley Muñoz
-
XZ backdoor story – Initial analysis
Source: Securelist Published on 2024-04-12 By GReAT
-
DinodasRAT Linux implant targeting entities worldwide
Source: Securelist Published on 2024-03-28 By Anderson Leite, Lisandro Ubiedo
-
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
Source: The Hacker News Published on 2024-04-18
-
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Source: The Hacker News Published on 2024-04-18
-
Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks
Source: The Hacker News Published on 2024-04-17
-
GenAI: A New Headache for SaaS Security Teams
Source: The Hacker News Published on 2024-04-17
-
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Source: The Hacker News Published on 2024-04-17
-
From OneNote to RansomNote: An Ice Cold Intrusion
Source: The DFIR Report Published on 2024-04-01 By editor
-
Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE
Source: The DFIR Report Published on 2024-03-04 By editor
-
SEO Poisoning to Domain Control: The Gootloader Saga Continues
Source: The DFIR Report Published on 2024-02-26 By editor
-
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Source: The DFIR Report Published on 2024-01-29 By editor
-
Lets Open(Dir) Some Presents: An Analysis of a Persistent Actor’s Activity
Source: The DFIR Report Published on 2023-12-18 By editor