Tag: Targets
-
Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets
LockBit ransomware attacks are constantly evolving by making use of a wide range of techniques to infect targets while also taking steps to …
-
US: North Korean Hackers Targeting Health Providers With ‘Maui’ Ransomware
A ransomware strain targeting the US healthcare sector has been linked to North Korean state-sponsored hackers, according to the FBI. The …
-
Advanced Phishing Scams Target Middle East and Impersonate UAE Ministry of Human Resources
CloudSEK researchers have identified an extensive phishing campaign in which threat actors (TA) were impersonating the Ministry of Human …
-
Pro-China Group Uses Dragonbridge Campaign to Target Rare Earth Mining Companies
A pro-China influence campaign singled out rare earth mining companies in Australia, Canada, and the U.S. with negative messaging in an …
-
Elusive ToddyCat APT Targets Microsoft Exchange Servers
An advanced persistent threat (APT) group, dubbed ToddyCat, is believed behind a series of attacks targeting Microsoft Exchange servers of …
-
Internet Explorer Now Retired but Still an Attacker Target
Microsoft’s official end-of-support for the Internet Explorer 11 desktop application on June 15 relegated to history a browser that’s been …
-
Magniber Ransomware Now Targets Windows 11 Machines
Magniber ransomware has been upgraded to target Windows 11 machines, according to cybersecurity software provider 360 Total Security. …
-
Predator Spyware Using Zero-day to Target Android Devices
Spyware developer firm Cytrox is under Google’s radar for developing exploits against five 0-day flaws in Android and Chrome. On …
-
Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor
The North Korea-backed Lazarus Group has been observed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the …
-
New Sysrv-k Botnet Exploiting Spring Cloud Gateway Flaws to Target Windows and Linux
Microsoft has discovered a new Sysrv botnet variant deploying cryptocurrency miners on Windows and Linux systems. The Microsoft Security …
-
Widespread Attack on WordPress Sites Targets Tatsu Builder Plug-in
A widespread attack is underway to exploit known RCE flaw in Tatsu Builder WordPress plug-in, according to a new …
-
Ready, IAM, Fire: How Weak IAM Makes You a Target
Cloud security is a broad industry spanning multiple solutions, from cloud workload protection (CWP) and cloud security posture management …
●●●