Kerberos –>Bronze Bit Attack Bypasses

Kerberos –>Bronze Bit Attack Bypasses

Kerberos, a computer-network authentication protocol, can be bypassed using a new attack technique revealed with a proof-of-concept exploit code. The technique, dubbed Bronze Bit attack, exploits the CVE-2020-17049 vulnerability. This…

StealthyTrident

A new Chinese APT campaign dubbed Operation StealthyTrident has been observed by researchers The operators behind Operation StealthyTrident have launched supply-chain attacks against hundreds of Mongolian government agencies. As a…
Microsoft will Quarantine Solarwinds

Microsoft will Quarantine Solarwinds

Microsoft a plans to start blocking and isolating versions of the SolarWinds Orion app that are known to have contained the Solorigate (SUNBURST) malware.This comes after a massive supply chain…
XS-Leaks , Web security Threat….

XS-Leaks , Web security Threat….

Google revealed that attackers are increasingly leveraging a specific class of vulnerabilities derived from side-channels built into the web platform, to extract sensitive data out of any web application. Dubbed…
PyMicropsia Malware

PyMicropsia Malware

Palo Alto Networks’ Unit 42 research team described AridViper as “an active threat group that continues developing new tools as part of their arsenal.”it shows multiple overlaps with other existing…
Intel Isreal breached

Intel Isreal breached

Hackers using Pay2key malware, which in the past has been used by Iranian hacking groups, announced on Twitter that they had managed to hack into the systems of Intel-owned and…