GitLab Releases Urgent Security Patches for Critical Vulnerability
The vulnerability has been addressed in GitLab versions 16.3.4 and 16.2.7.
Read More...The vulnerability has been addressed in GitLab versions 16.3.4 and 16.2.7.
Read More...The threat actor included a summary in the README file and a Streamable video demonstrating how to use the PoC, which added further legitimacy to the malicious package
Read More...In July 2023, Storm-0324 began using phishing lures sent over Teams with malicious links leading to a malicious SharePoint-hosted file
Read More...Microsoft has fixed an actively exploited local privilege elevation vulnerability that allows attackers to gain SYSTEM privileges
Read More...The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials
Read More...A consumer signing system crash in April of 2021 resulted in a snapshot of the crashed process
Read More...Pulling off the attack requires administrative permissions to communicate with the wcifs driver and it cannot be used to override files on the host system
Read More...Targets include internet backbone infrastructure and healthcare entities in Europe and the U.S
Read More...Tracked as CVE-2023-2868, the vulnerability was first exploited in October 2022 to backdoor ESG appliances and steal data from the compromised systems
Read More...More than 1,200 servers were backdoored before administrators installed the patch for the vulnerability
Read More...