|
You are here |
talosintelligence.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | CVE-2023-44487, a vulnerability in the HTTP/2 protocol, was recently used to launch intensive DDoS attacks against several targets. | |
| | | | |
www.snort.org
|
|
| | | | | Snort - Individual SID documentation for Snort rules | |
| | | | |
securityinaction.wordpress.com
|
|
| | | | | TL; DR Following the recent supply chain attack upon 3CX that was detected in late March, follow the links below to determine the appropriate response actions, how to tell if your environment was affected and mitigation/prevention advice. ======================== Getting Started If you use 3CX software within your organisation, if you have not already done so,... | |
| | | | |
www.cybereason.com
|
|
| | | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data... | ||