Vulnerable Docker Installations Are A Playhouse for Malware Attacks

4 years ago

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has…

Ukraine IT Army hit EGAIS portal impacting Russia’s alcohol distribution

4 years ago

Ukraine IT Army launched massive DDoS attacks on the EGAIS portal that has a crucial role in Russia's alcohol distribution.…

Google addresses actively exploited Android flaw in the kernel

4 years ago

Google released the May security bulletin for Android, 2022-05-05 security patch level, which fixed an actively exploited Linux kernel flaw.…

Cisco addresses three bugs in Enterprise NFVIS Software

4 years ago

Cisco addresses three flaws impacting its Enterprise NFV Infrastructure Software (NFVIS) that could allow the compromise of the hosts. Cisco…

A couple of 10-Year-Old flaws affect Avast and AVG antivirus

4 years ago

Researcher discovered a couple of high-severity security flaws that affect a driver used by Avast and AVG antivirus solutions. SentinelOne…

F5 warns its customers of tens of flaws in its products

4 years ago

Cybersecurity provider F5 released security patches to address tens of vulnerabilities affecting its products. Security and application delivery solutions provider…

China-linked Winnti APT steals intellectual property from companies worldwide

4 years ago

A sophisticated cyberespionage campaign, dubbed Operation CuckooBees, conducted by the China-linked Winnti group remained undetected since at least 2019. Researchers…

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

4 years ago

Pro-Ukraine hackers are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen Russian and Belarusian websites. Pro-Ukraine hackers, likely linked…

Experts linked multiple ransomware strains North Korea-backed APT38 group

4 years ago

Researchers from Trellix linked multiple ransomware strains to the North Korea-backed APT38 group. The ransomware was employed in attacks on…

An expert shows how to stop popular ransomware samples via DLL hijacking

4 years ago

A security researcher discovered that samples of Conti, REvil, LockBit ransomware were vulnerable to DLL hijacking. The security researcher John…

This website uses cookies.