A vulnerability found in 2021 has been patched and re-patched in the months since it was reported. We analyze the bug and outline the processRead more
This week, read about how crucial it is for security teams to adopt an integrated approach to threat detection, such as remote control, and Congress’sRead more
First, we compiled the code into something easily handled by a fuzzer. For our purposes, we used the generation method that will allow us toRead more
Fortunately, we were able to provide the customer with timely alert and intervention from the moment the initial intrusion via the cloud server was observedRead more
The security research community had been expecting something like this to come along for a while. So it was with a sense of dread thatRead more
The end of 2021 saw the emergence of the Log4Shell (CVE-2021-44228) vulnerability, a critical vulnerability in the ubiquitous Java logging package Apache Log4j. Exploiting Log4ShellRead more
Staging a Quack: Reverse Analyzing a Fileless QAKBOT Stager We analyzed a fileless QAKBOT stager possibly connected to the recently reported Squirrelwaffle campaign. By: AbrahamRead more
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days.Read more
Volatile and Adaptable: Tracking the Movements of Modern Ransomware Ransomware Trend Micro’s tracking of modern ransomware, as well as of older families, shows which attacksRead more
While analyzing samples, we found that the C&C server was already inactive. Without knowing the traffic between SmileSvr and C&C server, we could not fullyRead more
Operating system execution via SQL Server Purple Fox focuses on SQL servers as its target as opposed to normal computers for the former’s cryptocurrency-mining activities.Read more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!