Fileless Malware Abuses Windows Event Logs

Fileless Malware Abuses Windows Event Logs

A sophisticated attack campaign was detected using a never-before-seen technique to stealthily plant fileless malware on targeted machines. Researchers revealed the newly adopted technique involves injecting shellcode directly into Windows event…
TLStrom 2.0 Affects Network Switches

TLStrom 2.0 Affects Network Switches

Researchers have uncovered five critical vulnerabilities in the implementation of Transport Layer Security in network switches used in millions of enterprises, dubbed as TLStorm 2.0, a sequel to three vulnerabilities…
Bumblebee malware the new Sophisticated Buzz

Bumblebee malware the new Sophisticated Buzz

Multiple waves of attacks are underway that feature a sophisticated new malware loader dubbed Bumblebee, stealthier by nature that fetches shellcode and second-stage tools, such as Cobalt Strike, Sliver, and Meterpreter possibly…
Nimbuspwn from Linux Threatens

Nimbuspwn from Linux Threatens

The Microsoft 365 Defender Research Team has discovered two Linux privilege escalation flaws tracked as CVE-2022-29799 and CVE-2022-29800 dubbed as Nimbuspwn, which can be exploited by attackers to conduct various…
Java Digital Signature Bypass Vulnerability

Java Digital Signature Bypass Vulnerability

Security researcher Khaled Nassar released a PoC code for a new digital signature bypass vulnerability, tracked as CVE-2022-21449 with CVSS score: 7.5 in Java. An unauthenticated attacker with network access via multiple…