Bumblebee attacks, from initial access to the compromise of Active Directory Services

3 years ago

Threat actors are using the Bumblebee loader to compromise Active Directory services as part of post-exploitation activities. The Cybereason Global Security…

Estonia blocked cyberattacks claimed by Pro-Russia Killnet group

3 years ago

Estonia announced to have blocked a wave of cyber attacks conducted by Russian hackers against local institutions. Undersecretary for Digital…

Safari 15.6.1 addresses a zero-day flaw actively exploited in the wild

3 years ago

Apple released Safari 15.6.1 for macOS Big Sur and Catalina to address a zero-day vulnerability actively exploited in the wild.…

Google blocked the largest Layer 7 DDoS reported to date

3 years ago

Google announced to have blocked the largest ever HTTPs DDoS attack, which reached 46 million requests per second (RPS). Google…

BlackByte ransomware v2 is out with new extortion novelties

3 years ago

A new version of the BlackByte ransomware appeared in the threat landscape, version 2.0 uses extortion techniques similar to LockBit ones.…

Apple fixed two new zero-day flaws exploited by threat actors

3 years ago

Apple addressed two zero-day vulnerabilities, exploited by threat actors, affecting iOS, iPadOS, and macOS devices. Apple this week released security updates for iOS,…

PoC exploit code for critical Realtek RCE flaw released online

3 years ago

Exploit code for a critical vulnerability affecting networking devices using Realtek RTL819x system on a chip released online. The PoC…

China-linked RedAlpha behind multi-year credential theft campaign

3 years ago

A China-linked APT group named RedAlpha is behind a long-running mass credential theft campaign aimed at organizations worldwide. Recorded Future researchers attributed…

Bugdrop dropper includes features to circumvent Google’s security Controls

3 years ago

Researchers have discovered a previously undocumented Android dropper, dubbed BugDrop, that's still under development. Recently, researchers from ThreatFabric discovered a…

Google fixed a new Chrome Zero-Day actively exploited in the wild

3 years ago

Google addressed a dozen vulnerabilities in the Chrome browser, including the fifth Chrome zero-day flaw exploited this year. Google this…

This website uses cookies.