Russia-linked APT targets Ukraine by exploiting the Follina RCE vulnerability

4 years ago

Ukraine's Computer Emergency Response Team (CERT) warns that the Russia-linked Sandworm APT group may exploit the Follina RCE vulnerability. Ukraine's…

GALLIUM APT used a new PingPull RAT in recent campaigns

4 years ago

China-linked Gallium APT employed a previously undocumented RAT, tracked as PingPull, in recent cyber espionage campaign targeting South Asia, Europe,…

HelloXD Ransomware operators install MicroBackdoor on target systems

4 years ago

Experts observed the HelloXD ransomware deploying a backdoor to facilitate persistent remote access to infected hosts. The HelloXD ransomware first appeared…

Using WiFi connection probe requests to track users

4 years ago

Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics…

Security Affairs newsletter Round 369 by Pierluigi Paganini

4 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for…

Ransomware gangs are exploiting CVE-2022-26134 RCE in Atlassian Confluence servers

4 years ago

Ransomware gangs are actively exploiting CVE-2022-26134 remote code execution (RCE) flaw in Atlassian Confluence Server and Data Center. Multiple ransomware…

HID Mercury Access Controller flaws could allow to unlock Doors

4 years ago

Experts found vulnerabilities in HID Mercury Access Controllers can be exploited by attackers to remotely unlock doors. Researchers from security…

Iran-linked Lyceum APT adds a new .NET DNS Backdoor to its arsenal

4 years ago

Iran-linked Lyceum APT group uses a new .NET-based DNS backdoor to target organizations in the energy and telecommunication sectors. The…

PACMAN, a new attack technique against Apple M1 CPUs

4 years ago

PACMAN is a new attack technique demonstrated against Apple M1 processor chipsets that could be used to hack macOS systems.…

Threat actors exploit recently disclosed Atlassian Confluence flaw in cryptomining campaign

4 years ago

Threat actors are exploiting the recently disclosed CVE-2022-26134 RCE in Atlassian Confluence servers to deploy cryptocurrency miners. CheckPoint researchers have…

This website uses cookies.