cl0p Ransomware Victim: enprecis-com
NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog...
NOTE: The information on this page is fully automated and scraped directly from the cl0p .onion Dark Web Tor Blog...
Threat actors are using a malicious Internet Information Services (IIS) Server module, dubbed Owowa, to steal Microsoft Exchange credentials. Kaspersky...
Kaspersky Managed Detection and Response (MDR) provides advanced protection against the growing number of threats that bypass automatic security barriers....
All statistics in this report are from the global cloud service Kaspersky Security Network (KSN), which receives information from components...
Trend Micro's tracking of modern ransomware, as well as of older families, shows which attacks are gaining momentum and which...
As you may already know, the business, tech, and cybersecurity industries have been buzzing about Log4Shell (CVE-2021-44228), aka Logjam, the...
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
Microsoft December 2021 Patch Tuesday addresses 67 vulnerabilities, including an actively exploited Windows Installer vulnerability. Microsoft December 2021 Patch Tuesday...
Summary: An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any...
Summary: An issue was discovered in EMC RSA BSAFE Crypto-J versions prior to 6.2.2. There is an Improper OCSP Validation...
Summary: An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6,...
Summary: An issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin...
Summary: An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload...
Researchers uncovered a new Seedworm campaign targeting telecommunication and IT service providers in the Middle East and Asia. Iran-linked APT...
Summary: CVE-2021-42278 is a privilege escalation vulnerability impacting multiple products and versions of Microsoft Windows. An exploit and a vulnerability...
Summary: CVE-2021-42287 is a privilege escalation vulnerability impacting multiple products and versions of Microsoft Windows. An exploit and a vulnerability...
The DHS has launched a new bug bounty program dubbed ‘Hack DHS’ to discover security vulnerabilities in external DHS systems....
While looking for potentially malicious implants that targeted Microsoft Exchange servers, we identified a suspicious binary that had been submitted...
Adobe warns of threat actors that could exploit critical vulnerabilities in multiple products running on Windows and macOS systems. Adobe...
Our long-term monitoring of the cyberespionage group Earth Centaur (aka Tropic Trooper) shows that the threat actors are equipped with...
Log4Shell., also known as CVE-2021-44228, was first reported privately to Apache on November 24 and was patched with version 2.15.0...
By examining Purple Fox’s routines and activities, both with our initial research and the subject matter we cover in this...
Trend Micro's VP of Threat Intelligence, Jon Clay, explores the latest trends in today's threat landscape and why XDR is...