Enemybot, a new DDoS botnet appears in the threat landscape

4 years ago

Enemybot is a DDoS botnet that targeted several routers and web servers by exploiting known vulnerabilities. Researchers from Fortinet discovered…

Stolen OAuth tokens used to download data from dozens of organizations, GitHub warns

4 years ago

GitHub reported that threat actors used stolen OAuth user tokens to exfiltrate private data from several organizations. GitHub uncovered threat…

Security Affairs newsletter Round 361 by Pierluigi Paganini

4 years ago

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…

U.S. Gov believes North Korea-linked Lazarus APT is behind Ronin Validator cyber heist

4 years ago

The U.S. government blames North Korea-linked APT Lazarus for the recent $600 million Ronin Validator cyber heist. The U.S. government…

The unceasing action of Anonymous against Russia

4 years ago

This week the Anonymous collective and its affiliates have targeted multiple Russian organizations stealing gigabytes of data. This week Anonymous…

Threat actors target the Ukrainian gov with IcedID malware

4 years ago

Threat actors are targeting Ukrainian government agencies with phishing attacks delivering the IcedID malware. The Ukrainian Computer Emergency Response Team…

Threat actors use Zimbra exploits to target organizations in Ukraine

4 years ago

Threat actors are targeting Ukrainian government organizations with exploits for XSS vulnerabilities in Zimbra Collaboration Suite (CVE-2018-6882). Ukraine's CERT (CERT-UA)…

Conti Ransomware Gang claims responsibility for the Nordex hack

4 years ago

The Conti ransomware gang has claimed responsibility for the recent attack against Nordex, one of the largest manufacturers of wind…

ZingoStealer crimeware released for free in the cybercrime ecosystem

4 years ago

A new powerful crimeware called ZingoStealer was released for free by a threat actor known as Haskers Gang. ZingoStealer is a…

Auth bypass flaw in Cisco Wireless LAN Controller Software allows device takeover

4 years ago

Cisco fixed a critical flaw in Cisco Wireless LAN Controller (WLC) that could allow an unauthenticated, remote attacker to take…

This website uses cookies.