|
You are here |
zimperium.com | ||
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers uncover an active malicious campaign in Latin America that uses new versions of old malware, Bandook, to spy on its victims. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | Godfather malware is a banking trojans used by different threat actors to target Android mobile devices. Read more about how it works. | |
| | | | |
www.cybereason.com
|
|
| | | | | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data... | |
| | | | |
www.runzero.com
|
|
| | | [AI summary] A critical security vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is detailed with specific affected versions, mitigation strategies, and instructions on using runZero to discover and patch potentially vulnerable systems. | ||