RowHammer Exploits

RowHammer Exploits

Rowhammer attacks, which were first discovered in 2014, continue to draw the attention of researchers and academics despite the mitigation measures put in place by chip manufacturers and industries. Intro…
Trend Micro Apex One Exploit

Trend Micro Apex One Exploit

Trend Micro disclosed that the threat actors are once again using security solutions as attack vectors and this time attackers are deliberately leveraging a vulnerability in its antivirus solutions, identified…
Qlocker locks Qnap

Qlocker locks Qnap

A new ransomware strain called "Qlocker" is targeting QNAP NAS devices as part of an ongoing campaign and encrypting files in password-protected 7zip archives and demanding Bitcoin payment for decryption…
ToxicEye 👁️

ToxicEye 👁️

Adversaries are increasingly abusing Telegram as a "C2C" system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. "Even when Telegram is…
Malware traffic too TLS Encypted

Malware traffic too TLS Encypted

After years of warnings about security, surveillance, and unwanted state intrusion, one group of internet-connected folk has taken heed: malware operators. Just under half of malware traffic it saw in…
Bloomberg Scam

Bloomberg Scam

Hackers are impersonating Bloomberg employees in an attempt to install remote access software on target computers. The ruse seeks to capitalize on the influence of Bloomberg Industry Group whose analysis…
Tag Barnakle

Tag Barnakle

Malvertising campaign tracked as "Tag Barnakle" has been behind the breach of more than 120 ad servers over the past year to sneakily inject code in an attempt to serve…