Rare Acidbox malware targeted Russian organizations using Turla APT exploit
The AcidBox malware is only a part of the bigger toolkit, which researchers have yet to identify.
The AcidBox malware is only a part of the bigger toolkit, which researchers have yet to identify.
Weekly vulnerability digest.
This is one of the largest campaigns targeting Chrome users discovered to date.
The InvisiMole malware exploits the BlueKeep vulnerability or the EternalBlue flaw to spread within compromised networks.
Services offered by HfH groups include social media hacking, damaging company’s reputation, launching DDoS-attacks, and much more.
After CDLAP reflection attacks, the second-most common DDoS vector observed by AWS in the first quarter of 2020 were SYN flood attacks.
The attackers used LinkedIn to compromise target companies.
Maze ransomware operators leaked 10.3GB of information allegedly belonging to MaxLinear.
The CIA's lax cybersecurity practices resulted in “the largest data loss in CIA history.”
The vulnerabilities could be exploited to achieve remote code execution, perform denial-of-service attacks, and to obtain potentially sensitive information.
Showing elements 3601 - 3610