Ongoing cyber-espionage campaign targets hundreds of industrial firms
More than 200 companies have become victims of Gangnam Industrial Style cyber-espionage operation.
More than 200 companies have become victims of Gangnam Industrial Style cyber-espionage operation.
Not only routers, firewalls, and IP cameras are among targets, but also online payment systems, PLCs, and even yacht control web applications.
The attacks took place during the summer of 2019 and went after track 1 and track two-type payment cards.
GALLIUM hackers exploit unpatched vulnerabilities to compromise Internet-exposed systems running WildFly/JBoss application servers.
The Zeppelin ransomware is the newest addition to the VegaLocker malware family.
The December 2019 Patch Tuesday fixes 36 flaws, including a zero-day privilege elevation vulnerability that was actively exploited in the wild.
The malware operators abuse Google Suite to deliver malicious payload.
The flaw affects most Linux distros, as well as other Unix-like operating systems including FreeBSD, OpenBSD, macOS, iOS, and Android.
The found sample appears to be the Lazarus group's first in-memory malware targeting the Apple operating system.
The ZeroCleare malware bears some similarity with the infamous Shamoon wiper.
Showing elements 3841 - 3850