Hackers actively exploiting MS Windows, Adobe ColdFusion flaws
Currently, its unclear, how the both flaws are being exploited.
Currently, its unclear, how the both flaws are being exploited.
The attacks mainly focus on Chinese-branded devices that are either awaiting critical security patches or have reached EoL status.
The threat actors employed phishing emails exploiting a known WinRAR flaw to deliver malware.
Glutton has some issues in its stealth and encryption mechanisms, which may indicate that it is still under development.
The attacks reportedly began in November and have increased through December.
The scheme involved recruiting children as young as 15 and 16 to carry out dangerous missions that directly aided Russian operations.
Threat actors reportedly exploited a suspected zero-day vulnerability.
In brief: Cleo fixes a critical bug exploited in the wild, Germany sinkholes the BADBOX botnet, and more.
The Android-based tool has been in operation since at least 2017.
Secret Blizzard used the Amadey bot malware to deliver its custom backdoor called “KazuarV2” onto specifically selected systems in Ukraine.
Showing elements 881 - 890