New Atomic macOS Malware Steals Keychain Passwords and Crypto Wallets
Users may be manipulated into downloading and executing the malware under the guise of legitimate software
Read More...Users may be manipulated into downloading and executing the malware under the guise of legitimate software
Read More...Improper error message handling in some firewall versions could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device
Read More...Ransomware operations have followed this trend and created Linux encryptors dedicated to targeting ESXi servers to encrypt all data used by the enterprise properly
Read More...Successful exploitation enables unauthenticated attackers to launch cross-site scripting attacks remotely but requires user interaction
Read More...With Cisco and VMware appliances turning out to be lucrative targets for threat actors, it's recommended that users move quickly to apply the updates to mitigate potential threats
Read More...The drivers can run with kernel privileges on the victims' devices to disable security solutions and take over the system
Read More...The MS-SQL servers are being breached via brute-force or dictionary attacks that take advantage of easy-to-guess account credentials
Read More...Successful exploitation can lead to remote, unauthenticated access to Redis and MongoDB instances via crafted authentication requests
Read More...Details about the two vulnerabilities have been withheld in light of active exploitation and to prevent more threat actors from abusing them
Read More...After the initial compromise, the threat actor used the Advanced IP Scanner and ADRecon utilities to gather information about the victim's environment
Read More...