New Snort & ClamAV Detection Signatures For Cobal Strike
New Snort, ClamAV coverage strikes back against Cobalt Strike
By Nick Mavis. Editing by Joe Marshall and Jon Munshaw.
Cisco Talos is releasing a new research paper called “The Art and Science...
Misconfigured Kubernetes Target Of XMRig Mining Campaign
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency
Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...
Air gapped hacking becoming a treasure trove of data for Hackers
Air-Gapped Systems are Becoming a Treasure Trove for Attackers
For years, air-gapping has been recommend as a standard cybersecurity practice to protect sensitive systems and networks. Often, organizations isolate their...
Information suggests extraordinary interest for hacking and cybercrime during pandemic
Author: Edvardas Mikalauskas
With unemployment rates skyrocketing across the world as prolonged COVID-19 lockdowns continue to wreck the global economy, people who are forced to stay at home without a...
Bad Bots – How To Fight Them and What Are They
Author: Asim Rahal
Bad internet bot traffic rose by 18.1% in 2019, and it now accounts for nearly one-quarter of all internet traffic
The figure above, which comes from Imperva’s 2020 Bad...
Denial Of Service Vulnerability in VMWare Workstation 15
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.
Cisco Talos recently discovered a denial-of-service vulnerability in VMware Workstation 15.
VMware allows users to set up virtual machines and...
All You Need To Know About Form Based Phishing Attacks
Author: Kyle Fedorek
Phishing methods have witnessed an evolution in the current landscape, coercing users into offering credentials. Researchers have warned people to keep an eye out for form-based phishing...
Ransomware Tactics, Techniques And How it Has Evolved
Ransomware Landscape Has Adapted and Evolved
Author: Kyle Fedorek
Ransomware attacks have increased manifold over the years and so have the ransom demands. This year-over-year evolution of ransomware threats is primarily...
Russian Military Hackers Sandworm Exploiting Mail Software Says NSA
By Sergiu Gatlan
The U.S. National Security Agency (NSA) says that Russian military threat actors known as Sandworm Team have been exploiting a critical flaw in the Exim mail transfer agent (MTA) software...
How A College Student Made 10k From Bug Bounties
Author: Tilson Galloway
API keys, passwords, and customer data are accidentally posted to GitHub every day.
Hackers use these keys to login to servers, steal personal information, and rack up absurd...