New PXA Stealer targets government and education sectors for sensitive information
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:37
comments (0)
in cybersecurity@sh.itjust.works from Joker@sh.itjust.works on 14 Nov 11:37
comments (0)
Threat actors use copyright infringement phishing lure to deploy infostealers.
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from Dot@feddit.org on 31 Oct 14:17
comments (0)
in cybersecurity@sh.itjust.works from Dot@feddit.org on 31 Oct 14:17
comments (0)
Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Oct 11:04
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 25 Oct 11:04
comments (4)
MedusaLocker ransomware variant paired with ‘paid_memes’ toolkit
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 2024 12:35
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 2024 12:35
comments (0)
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 2024 11:32
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Aug 2024 11:32
comments (0)
OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Apr 2024 11:37
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 19 Apr 2024 11:37
comments (0)
Reversing a vulnerability in the Ichitaro Office Suite and Leveraging it into an FP overwrite for Silent Code Execution (RE walkthrough)
(blog.talosintelligence.com)
in netsec@lemmy.world from repostbot33@lemmy.world on 27 Mar 2024 15:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 27 Mar 2024 15:00
comments (0)
Threat actors leverage document publishing sites for ongoing credential and session token theft
(blog.talosintelligence.com)
in netsec@lemmy.world from repostbot33@lemmy.world on 20 Mar 2024 18:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 20 Mar 2024 18:00
comments (0)
Astaroth, Mekotio & Ousaban abusing Google Cloud Run in LATAM-focused malware campaigns
(blog.talosintelligence.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Feb 2024 12:14
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 22 Feb 2024 12:14
comments (0)
Snapshot fuzzing Windows' direct composition with WTF
(blog.talosintelligence.com)
in netsec@lemmy.world from repostbot33@lemmy.world on 18 Oct 2023 12:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 18 Oct 2023 12:00
comments (0)
Cybercriminals target Windows Advanced Installer to run crypto-mining malware
(blog.talosintelligence.com)
in netsec@lemmy.world from repostbot33@lemmy.world on 09 Sep 2023 12:00
comments (0)
in netsec@lemmy.world from repostbot33@lemmy.world on 09 Sep 2023 12:00
comments (0)