The Salt Project has patched a privilege escalation bug impacting SaltStack Salt minions that could be used during a wider exploit chain. SaltStack’s Salt is an open source project and…
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads known to be GootKit Malware revolving around banking…
Recent cryptomining botnet campaign has been observed using Bitcoin blockchain transactions to hide its backup C2 IP addresses.Adoption of this technique can be troublesome and expected to become popular in…
The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Crooks conduct SIM swapping attacks…
Information belonging to a shopper of not too long ago hacked California-based non-public cloud options firm Accellion is being marketed on the market on-line by cyber-criminals. On the web site…
Some of the tactics, techniques and procedures being widely used by ransomware operators in their efforts that organizations should monitor: AdFind: This command-line Active Directory tool gets employed - like…
The National Security Agency issued instructions for defense agencies and contractors on how to set up a zero-trust network architecture. The push to zero trust where compromise is assumed and…
Microsoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites that use a malicious font. The flaw was found by Google's Project…