Confluence exploits used to drop ransomware on vulnerable servers
Credit to Author: Andrew Brandt| Date: Thu, 16 Jun 2022 11:00:03 +0000
Automated attacks are now widely exploiting the Atlassian vulnerability
Read moreCredit to Author: Andrew Brandt| Date: Thu, 16 Jun 2022 11:00:03 +0000
Automated attacks are now widely exploiting the Atlassian vulnerability
Read moreCredit to Author: Andrew Brandt| Date: Wed, 15 Jun 2022 21:16:52 +0000
Two groups with common task targeted network security devices in two-stage attacks, dropping remote access tools.
Read moreCredit to Author: Matt Wixey| Date: Wed, 15 Jun 2022 11:00:05 +0000
Attacker targets bugs in a popular web application graphical interface development tool
Read moreCredit to Author: Angela Gunn| Date: Tue, 14 Jun 2022 18:24:12 +0000
The second-lightest set of updates so far in 2022 goes heavy on RCEs, brings along four Intel patches for company
Read moreCredit to Author: Andrew Brandt| Date: Tue, 31 May 2022 00:41:42 +0000
MSDT.exe misuse in May makes for Memorial Day Monday mayhem
Read moreCredit to Author: Angela Gunn| Date: Tue, 07 Jun 2022 11:16:50 +0000
Our latest report shows that the most pleasant way to learn from Rapid Response mayhem is to read about how it worked out for someone else
Read moreCredit to Author: hardikshah| Date: Wed, 01 Jun 2022 14:31:06 +0000
How could a humble SSL certificate entirely gridlock a system? Walk with us through the math
Read moreCredit to Author: Andrew Brandt| Date: Tue, 31 May 2022 00:41:42 +0000
MSDT.exe misuse in May makes for Memorial Day Monday mayhem
Read moreCredit to Author: gallagherseanm| Date: Tue, 17 May 2022 11:52:33 +0000
Organized rings use fake apps, malicious smart contracts, and lure of big returns to swindle victims out of their savings.
Read moreCredit to Author: Christopher Budd| Date: Tue, 10 May 2022 17:47:43 +0000
Organizations should look at last month’s and this month’s bulletins and put their Hyper-V and Active Directory servers and infrastructure at the top of the priority list.
Read more