Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Malicious

CISA: Hackers Continue to Exploit Log4Shell in Unpatched VMware Servers

24 June 2022

VMware released patches related to Log4Shell, a vulnerability in a popular Java framework that left countless servers at risk, in December …

Tags Actors, Cyber, Cyber Threats, Hacking, Malicious

Threat actors continue to exploit Log4Shell in VMware Horizon Systems

24 June 2022

The U.S. CISA and the Coast Guard Cyber Command (CGCYBER) warn of attacks exploiting the Log4Shell flaw in VMware Horizon …

Tags Actors, APT, Cyber, Malicious, Systems

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

24 June 2022

If your organization is running VMware Horizon and Unified Access Gateway servers and you haven’t implemented the patches or workarounds …

Tags Actors, Cyber, Malicious, Systems, Vulnerability

New ‘Quantum’ Builder Lets Attackers Easily Create Malicious Windows Shortcuts

24 June 2022

A new malware tool that enables cybercriminal actors to build malicious Windows shortcut (.LNK) files has been spotted for sale on …

Tags Attackers, Builder, Create, Cyber Crime, Malicious

Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data

24 June 2022

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Coast Guard Cyber Command (CGCYBER), on Thursday released …

Tags Actors, Cyber, Malicious, Systems, Vulnerability

AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

23 June 2022

Note: this advisory uses the MITRE ATT&CK for Enterprise framework, version …

Tags Actors, Cyber, Log4Shell, Malicious, Systems

Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

23 June 2022

 CISA and the United States Coast Guard Cyber Command (CGCYBER) have released a joint Cybersecurity Advisory (CSA) to warn network …

Tags Actors, Cyber, Log4Shell, Malicious, Security Pro

YODA Tool Found ~47,000 Malicious WordPress Plugins Installed in Over 24,000 Sites

1 June 2022

As many as 47,337 malicious plugins have been uncovered on 24,931 unique websites, out of which 3,685 plugins were sold on legitimate …

Tags Found, Malicious, Plugins, Sites, Tools

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

24 May 2022

Two trojanized Python and PHP packages have been uncovered in what’s yet another instance of a software supply chain attack targeting the …

Tags Malicious, Popular, Programming, Programming Languages, PyPI

Malicious Python Repository Package Drops Cobalt Strike on Windows, macOS & Linux Systems

23 May 2022

The PyPI “pymafka” package is the latest example of growing attacker interest in abusing widely used open source software …

Tags Cloud Computing, Linux, Malicious, Microsoft, Packages

Snake Keylogger Spreads Through Malicious PDFs

23 May 2022

While most malicious e-mail campaigns use Word documents to hide and spread malware, a recently discovered campaign uses a malicious PDF …

Tags Keyloggers, Malicious, Malware, PDFs, Snakes

Malicious Reconnaissance: What It Is and How To Stop It

19 May 2022

…

Tags Is, Malicious, Reconnaissance, Risk Management, Security Services

Sinister Eternity Malware Kit Is Being Sold On Telegram With Malicious Options Galore

13 May 2022

Lately, cybercriminals have been using Telegram to sell malware and other malicious tools as a service. Last month we reported on a …

Tags Is, IT, Kit, Malicious, Malware

Nerbian RAT Malware Delivered Using Word Documents That Include Malicious Macro Code

12 May 2022

There has been the discovery of a new remote access trojan called Nerbian RAT by the researchers at Proofpoint, which has a number of …

Tags Codes, Documents, Include, Macro, Malicious
Post navigation
Older posts
Page1 Page2 … Page26 Next →
Cookie-Free

NVD

  • CVE-2022-34835 – In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based b …30 June 2022
  • CVE-2017-20121 – A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as cr …30 June 2022
  • CVE-2017-20122 – A vulnerability classified as problematic was found in Bitrix Site Manager 12.06.2015. Aff …30 June 2022
  • CVE-2017-20123 – A vulnerability was found in Viscosity 1.6.7. It has been classified as critical. This aff …30 June 2022
  • CVE-2017-20124 – A vulnerability classified as critical has been found in Online Hotel Booking System Pro P …30 June 2022
  • CVE-2017-20125 – A vulnerability classified as critical was found in Online Hotel Booking System Pro 1.2. A …30 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Pandora FMS v7.0NG.742 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022

SECURELIST

  • The SessionManager IIS backdoor30 June 2022
  • The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact30 June 2022
  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »