Microsoft Exchange ProxyShell exploits used to deploy Babuk ransomware Post Views: 1,238 Reading Time: 1 Minute A new threat actor is hacking Microsoft Exchange servers and breaching corporate networks using the ProxyShell vulnerability to deploy the Babuk...
Mekotio Banking Trojan Resurges with Tweaked Code, Stealthy Campaign Post Views: 392 Reading Time: 1 Minute A new version of a banking trojan known as Mekotio is being deployed in the wild, with malware analysts reporting that it’s using a new,...
Over 30,000 GitLab servers still unpatched against critical bug Post Views: 683 Reading Time: 1 Minute A critical unauthenticated, remote code execution GitLab flaw fixed on April 14, 2021, remains exploitable, with over 50% of deployments remaining...
‘Trojan Source’ attack method can hide bugs into open-source code Post Views: 640 Reading Time: 2 Minutes Academic researchers have released details about a new attack method they call “Trojan Source” that allows injecting vulnerabilities into the...
Chaos ransomware targets gamers via fake Minecraft alt lists Post Views: 357 Reading Time: 1 Minute The Chaos Ransomware gang encrypts gamers’ Windows devices through fake Minecraft alt lists promoted on gaming forums. Minecraft is a massively...
All Windows versions impacted by new LPE zero-day vulnerability Post Views: 3,397 Reading Time: 1 Minute A public proof-of-concept (PoC) exploit and technical details for an unpatched Windows zero-day privilege elevation vulnerability has been disclosed that...