A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

12 New Flaws Used in Ransomware Attacks in Q3

The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families compared with Q2 2021. A dozen new vulnerabilities were used…

Cring Ransomware Group Stands Out with One More Hit

Cring Ransomware Group makes headlines again with a new hit. Worn-out ColdFusion servers and VPNs: the new targets. Cring Ransomware Group: Short Background In April 2021, we were writing about…

Cring ransomware continues assault on industrial organizations with aging applications, VPNs

The Cring ransomware group continues to make a name for itself through attacks on aging ColdFusion servers and VPNs after emerging earlier this year.  Experts like Digital Shadows Sean Nikkel…

Examining the Cring Ransomware Techniques

Trend Micro – Trend Micro – Here is a more detailed description of this chain: Initial Access The Cring ransomware gains initial access either through unsecure or compromised RDP or…