Maze infects via VM 🐾

The gang responsible for the Maze ransomware family conducted an attack in which they distributed their malware payload inside of a virtual machine (VM). The attackers packaged the ransomware payload…

Ngrok Abused

Cybercriminals have been using ngrok—a cross-platform application to expose local development servers to the internet, for malicious purposes for years now. An organization was targeted by a keylogger, where malicious…

CVE 2020-1472 – Exploit goes wild

The CVE-2020-1472 flaw is an elevation of privilege that resides in the Netlogon. The Netlogon service is an Authentication Mechanism used in the Windows Client Authentication Architecture which verifies logon…

Shlayer Malware targets MacOs

A new Shlayer macOS malware variant which obfuscates itself to sneak past security tools and compromise a target machine. Dubbed ‘ZShlayer’, the variant does not conform to the original Shlayer…

It’s Blurtooth 💙 Not bluetooth

A vulnerability in the ubiquitous Bluetooth wireless standard could enable hackers to connect to devices remotely in a given area and access users’ applications dubbed Blurtooth Bluetooth is found in…