- In the spotlight this week: Microsoft has released a patch addressing a critical vulnerability that affects Remote Desktop Services on several legacy Windows operating systems. The flaw, referred as CVE-2019-0708, is particularly dangerous because it is “pre-authenticated” and does not require user interaction, meaning it could facilitate a widespread attack of a similar scale to the disruptive “WCry” campaign of May 2017.
- Highlights from the week include: A campaign likely conducted by the “MuddyWater” threat group that has demonstrated new obfuscation techniques, the continued development of the “Trickbot” trojan’s anti-detection capabilities in a new campaign adopting URL redirection tactics, and the deletion of over 12,000 MongoDB databases by the threat actor “Unistellar” as part of an extortion campaign.
In the spotlight this week: First identified in April 2019, a new version of the malware loader “JasperLoad...
Most Recent Flipbooks
The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.
An unidentified attacker accessed the computer systems of a water treatment facility in the US, altering sodium hydroxide levels in the potable water supply.
Following the disclosure of the SolarWinds supply-chain compromise in December 2020, details continue to emerge about the scale of the attack.
The North Korean advanced persistent threat (APT) group “ZINC” has been targeting cyber-security professionals with social engineering that leads to malware delivery.
A new web portal is aiding cyber-threat incident responders by detailing vulnerabilities in popular malware.
Technical analysis of a cyber-threat campaign using the dangerous and widespread “Lokibot” malware has revealed an updated method being used to conduct sophisticated attacks.
A cyber-security firm released a free decryptor for the popular and sophisticated “DarkSide” ransomware.
The cyber-security industry learned some valuable lessons during the unique and unprecedented year of 2020.
The notorious Automated Vending Cart (AVC) website Joker’s Stash allegedly displayed a notification that the site was seized by law-enforcement agencies.
SolarWinds confirmed that its network management system, Orion Platform, was exploited to conduct a highly sophisticated, manual supply-chain attack.
A global spearphishing campaign targeted organizations associated with a COVID-19 vaccine cold chain.
A threat actor recently hijacked a vulnerable WordPress website set up by a security researcher.
The operators of the “RagnarLocker” ransomware began an advertising campaign on Facebook to further extort the victim of one of their recent attacks.
“CostaRicto” has become the fourth cyber-mercenary group to be discovered in 2020.
The North Korean cyber-threat group “Kimsuky” has caught the attention of the US Cybersecurity and Infrastructure Security Agency (CISA), having proved itself a significant advanced persistent threat.
The developers of the infamous “Maze” ransomware claimed to have permanently ceased operations.
After a short hiatus, the “Ryuk” ransomware variant is back with upgrades, including the ability to fully encrypt data in just five hours.
A ruthless, ever-evolving cyber-threat group, “FIN11”, has been discovered deploying “Clop”: ransomware that encrypts and exfiltrates data.
Advanced persistent threat groups linked to China and Iran have conducted cyber espionage through front companies, under the guise of legitimate technology services.
The source code of several operating systems (OS) developed by Microsoft has been published online, sparking public concerns about security.