|
You are here |
blog.eclecticiq.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | By Flavio Costa, * In a recent customer engagement, we observed a month-long AvosLocker campaign. * The attackers utilized several different tools, including Cobalt Strike, Sliver and multiple commercial network scanners. * The initial ingress point in this incident was a pair of VMWare Horizon Unified Access Gateways that were vulnerable to Log4Shell. | |
| | | | |
www.cybereason.com
|
|
| | | | | Email extortion campaign by threat actor group CL0P targets e-business suite users under CVE-2025-61882 | |
| | | | |
thehackernews.com
|
|
| | | | | Czechia and Germany reveal they were targets of a massive cyber espionage campaign by Russia-linked APT28 hacker group. | |
| | | | |
www.malwaretech.com
|
|
| | | A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of my free time developing a Windows XP 32-bit bootkit. Now, before you get on the phone to your friendly neighborhood FBI agent, I'd like to make clear a few thing: The bootkit is written as a proof of concept, it would be very difficult to weaponize, and there is no weaponized version to fall into the hands of criminals. For those of you who don't know, a bootkit is a type of rootkit that begins executing at boot time. By infecting the BIOS, Master Boot Record, Volume Boot Record or Initial Program Loader; Malware can begin execution early on in the operating sys... | ||