Defender Blocks Proxy Logon

Defender Blocks Proxy Logon

Microsoft announced that Defender Antivirus and System Center Endpoint Protection now provide automatic protection against attacks exploiting the recently disclosed ProxyLogon vulnerabilities in Microsoft Exchange. “Today, we have taken an…
Copper Stealer

Copper Stealer

A newly documented Chinese-based malware called CopperStealer that,infected up to 5,000 individual hosts per day, stealing credentials of users on major platforms including Facebook, Instagram, Apple, Amazon, Bing, Google, PayPal,…
Acer Revil’ed ☠️

Acer Revil’ed ☠️

Computer giant Acer has been hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to date, $50,000,000. The ransomware gang announced on their…
Zero Days Under Active Exploit

Zero Days Under Active Exploit

Malware hunters at Google continue to call attention to a sophisticated APT group that burned through at least 11 zero-days exploits in less than a year to conduct mass spying…
Earth Vetela

Earth Vetela

A campaign has been witnessed by security researchers, the campaign is targeting companies in the Middle East and nearby regions Dubbed “Earth Vetala” the recently detected campaign. The experts found…
CHIRP  Detection Tool

CHIRP Detection Tool

CISA has released a new tool to detect post-compromise malicious activity associated with the SolarWinds hackers in on-premises enterprise environments. CISA Hunt and Incident Response Program (CHIRP), the new forensics…
Eggshell iOS

Eggshell iOS

Hackers appear to be targeting Apple developers with a backdoor that has worked its way into a shared Xcode project, SentinelOne says an external researcher alerted the company about malicious…