IT Information Security

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT…

4 years ago

New variant for Mac Malware XCSSET compiled for M1 Chips

Kaspersky researchers spotted a new variant of the XCSSET Mac malware that compiled for devices running on Apple M1 chips.…

4 years ago

10,000+ WeLeakInfo customer records leaked

An actor claimed to have registered one of the domains of WeLeakInfo, accessed details of 10000+ WeLeakInfo' s customers, and…

4 years ago

Internet disruption in Russia coincided with the introduction of restrictions

Experts at the NetBlocks Internet Observatory observed this week a temporary disruption of internet service in Russia due to new…

4 years ago

Researchers warn of a surge in cyber attacks against Microsoft Exchange

Researchers warn of a surge in cyber attacks against Microsoft Exchange servers exploiting the recently disclosed ProxyLogon vulnerabilities. Researchers at…

4 years ago

Malspam campaign uses icon files to delivers NanoCore RAT

Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore…

4 years ago

Expert publishes PoC exploit code for Microsoft Exchange flaws

This week a security researcher published on GitHub a proof-of-concept tool to hack Microsoft Exchange servers chaining two of ProxyLogon…

4 years ago

Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws

Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway…

4 years ago

RedXOR, a new powerful Linux backdoor in Winnti APT arsenal

Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the…

4 years ago

F5 addresses critical vulnerabilities in BIG-IP and BIG-IQ

Security firm F5 announced the availability of patches for seven vulnerabilities in BIG-IP, four of which have been rated as…

4 years ago

This website uses cookies.