Innovative Spy Trojan Targets European Diplomatic Targets
Descended from the COMPFun RAT, the malware can propagate to removable drives.
Descended from the COMPFun RAT, the malware can propagate to removable drives.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As more businesses leverage remote, mobile, and temporary workforces, the elements of business continuity planning are evolving and requiring that IT professionals look deep into the nuts and bolts of connectivity. CISOs and their team members are facing new challenges each and every day, many of which have been driven by digital transformation, as well…
Remember the Reverse RDP Attack—wherein a client system vulnerable to a path traversal vulnerability could get compromised when remotely accessing a server over Microsoft’s Remote Desktop Protocol? Though Microsoft had patched the vulnerability (CVE-2019-0887) as part of its July 2019 Patch Tuesday update, it turns out researchers were able to bypass the patch just by…
Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A cybersecurity researcher at ESET today published an analysis of a new piece of malware, a sample of which they spotted on the Virustotal malware scanning engine and believe the hacker behind it is likely interested in some high-value computers protected behind air‑gapped networks. Dubbed ‘Ramsay,’ the malware is still under development with two more…
Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S. government released information about three new malware strains used by state-sponsored North Korean hackers. Called COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH, the malware variants are capable of remote reconnaissance and exfiltration of sensitive information from target systems,…
Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they’re threatening to leak the 756 gigabytes of stolen data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
In the past, the autonomous breach protection company Cynet announced that it is making Cynet 360 threat detection and response platform available at no charge for IR (incident response) service providers and consultants. Today Cynet takes another step and announces a $500 grant for Incident Responders for each IR engagement in which Cynet 360 was…