Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

C2

Malicious Software Infrastructure Easier to Get and Deploy Than Ever

8 January 2021

Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …

Tags C2, Deploy, Get, Malware, Metasploit

Sunburst’s C2 Secrets Reveal Second-Stage SolarWinds Victims

18 December 2020

More information has come to light about the Sunburst backdoor that could help defenders get a better handle on the scope of the sprawling …

Tags C2, Cloud Computing, Cloud Security, Critical Infrastructure, Governments

Magecart Credit-Card Skimmer Adds Telegram as C2 Channel

1 September 2020

The e-commerce card-skimming landscape has a new wrinkle: Cybercriminals affiliated with the Magecart collective are using encrypted …

Tags C2, Channels, Magecart, Malware, Malwarebytes

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

13 August 2020

The U.S. government is warning of new malware, dubbed Drovorub, that targets Linux …

Tags Attacks, C2, Espionage, Linux, OS

Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

22 July 2020

In this in-depth Threatpost podcast Christoph Hebeisen, who leads the Security Intelligence Research Division at Lookout, shares a …

Tags Android, C2, Down, Google, Hole

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

17 June 2020

April 24, 2012 – The fight against malware is a cat-and-mouse game. It is constant and constantly …

Tags APT, C2, Malware, Security Pro, Threat Analysis

Russian Turla APT Group Hacked Iranian APT C2 Server For Backdoor Access To Expand The Cyber Attack

26 October 2019

Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server …

Tags Access, APT, C2, Cyber Crime, Groups

Russian Turla APT Group Hacked Iranian APT Group C2 Server For Backdoor Access To Expand The Attack

26 October 2019

Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server …

Tags Access, APT, Attacks, C2, Cyber Attack

Hackers Drop Spyware and Steal the Password, Credit card and Browers Data Using Telegram as a C2 Server

30 September 2019

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data …

Tags C2, Computer Security, Credits, Data, Drop

Masad Spyware Uses Telegram Bots for Command-and-Control

27 September 2019

A freshly discovered commercial spyware dubbed the “Masad Clipper and Stealer” is using Telegram bots as its command-and-control (C2) …

Tags Bots, C2, Fortnite, Juniper, Malware

Panda Threat Group Mines for Monero With Updated Payload, Targets

17 September 2019

The Panda threat group, best known for launching the widespread and successful 2018 “MassMiner” cryptomining malware campaign, has …

Tags C2, Cryptomining, Hacks, Malware, Monero

Hackers using Facebook and YouTube Profiles to Host Astaroth Malware C2 Server

16 September 2019

Cybercriminals abusing Facebook and YouTube profiles to host the Astaroth malware that launches through sophisticated phishing campaign to …

Tags C2, Hacking, Hosts, Profiles, Servers
Post navigation
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

CVE-2019-18945 – Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are …

26 February 2021

CVE-2021-23962 – Incorrect use of the ‘<RowCountChanged>’ method could have led to a user-after-poiso …

26 February 2021

CVE-2020-28646 – ownCloud owncloud/client before 2.7 allows DLL Injection. The desktop client loaded develo …

26 February 2021

CVE-2020-27223 – In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when …

26 February 2021

CVE-2021-26566 – Insertion of sensitive information into sent data vulnerability in synorelayd in Synology …

26 February 2021

CVE-2019-18946 – Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are …

26 February 2021

EXPLOITS

Remote Desktop Web Access – Authentication Timing Attack (Metasploit Module)

26 February 2021

LightCMS 1.3.4 – ‘exclusive’ Stored XSS

26 February 2021

Triconsole 3.75 – Reflected XSS

26 February 2021

Simple Employee Records System 1.0 – File Upload RCE (Unauthenticated)

26 February 2021

Vehicle Parking Management System 1.0 – ‘catename’ Persistent Cross-Site Scripting (XSS)

25 February 2021

ASUS Remote Link 1.1.2.13 – Remote Code Execution

25 February 2021

SECURELIST

The state of stalkerware in 2020

26 February 2021

Lazarus targets defense industry with ThreatNeedle

25 February 2021

DDoS attacks in Q4 2020

16 February 2021

Spam and phishing in 2020

15 February 2021

How kids coped with COVID-hit winter holidays

4 February 2021

Privacy predictions for 2021

28 January 2021

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.