PoC exploit for CVE-2021-1675 RCE started circulating online

5 years ago

Proof-of-concept exploit code for CVE-2021-1675 flaw, an attacker could exploit it to compromise Windows systems. Proof-of-concept exploit code for the…

Linux version of REvil ransomware targets ESXi VM

5 years ago

The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware…

Experts developed a free decryptor for the Lorenz ransomware

5 years ago

Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new…

GitHub paid out over $500K through its bug bounty program for 203 flaws in 2020

5 years ago

Code repository hosting service GitHub announced that it has paid out more than $1.5 million through its bug bounty program since…

Microsoft investigates threat actor distributing malicious Netfilter Driver

5 years ago

Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant…

The builder for Babuk Locker ransomware was leaked online

5 years ago

The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware…

Six typosquatting packages in PyPI repository laced with crypto miner

5 years ago

Researchers discovered six rogue packages in the official Python programming language’s PyPI repository containg cryptocurrency mining malware. Experts from security firm Sonatype have…

Crackonosh Monero miner made $2M after infecting 222,000 Win systems

5 years ago

Researchers have discovered a strain of cryptocurrency-mining malware, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection.  Researchers from Avast…

Security Affairs newsletter Round 320

5 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

Hackers target Cisco ASA devices after a PoC exploit code was published online

5 years ago

Experts warn of attacks against Cisco ASA devices after researchers have published a PoC exploit code on Twitter for a…

This website uses cookies.