Log4j attackers switch to injecting Monero miners via RMI Post Views: 857 Reading Time: 1 Minute Some threat actors exploiting the Apache Log4j vulnerability have switched from LDAP callback URLs to RMI or even used both in a single request for maximum chances of...
Hackers steal Microsoft Exchange credentials using IIS module Post Views: 1,286 Reading Time: 1 Minute Threat actors are installing a malicious IIS web server module named ‘Owowa’ on Microsoft Exchange Outlook Web Access servers to steal credentials and...
New ransomware now being deployed in Log4Shell attacks Post Views: 1,131 Reading Time: 1 Minute The first public case of the Log4j Log4Shell vulnerability used to download and install ransomware has been discovered by researchers. Last Friday, a...
Attackers can get root by crashing Ubuntu’s AccountsService Post Views: 1,878 Reading Time: 1 Minute A local privilege escalation security vulnerability could allow attackers to gain root access on Ubuntu systems by exploiting a double-free memory corruption bug in...
Hackers start pushing malware in worldwide Log4Shell attacks Post Views: 2,952 Reading Time: 2 Minutes Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers Early...
Malicious Notepad++ installers push StrongPity malware Post Views: 1,618 Reading Time: 1 Minute The sophisticated hacking group known as StrongPity is circulating laced Notepad++ installers that infect targets with malware. This hacking group, also known as...