Chinese hackers target MSSQL Servers with a new backdoor
The Skip-2.0 backdoor allows the attacker to gain persistence in the victim's MSSQL while remaining undetected.
The Skip-2.0 backdoor allows the attacker to gain persistence in the victim's MSSQL while remaining undetected.
The malicious plugins hide themselves in the WordPress dashboard from anyone who doesn’t use browsers with specific User-Agent strings.
Cybersecurity researchers uncovered cyber-espionage operation that went undetected for at least six years.
Graboid is reportedly the first crypto-jacking worm that spreads using containers in the Docker Engine.
The Rocke group has switched to a new C2 infrastructure moving away from Pastebin in favor of a self-hosted solution.
The hacking group was planning a "devastating supply-chain attack" against a high-profile Asian mobile hardware and software manufacturer.
The researchers discovered a new loader and a module that exploits the legitimate remote administration software used by the ATM maker NCR Corporation.
The Attor malware comes with some unusual capabilities including the use of encrypted modules, Tor-based communications, and a plugin designed for GSM fingerprinting.
The Iranian state-sponsored hackers Charming Kitten employed new spear-phishing methods in a campaign observed in August and September.
It is estimated that more than 6,500 sites are affected, that number could be even higher.
Showing elements 3881 - 3890