Avast Finds Backdoor on US Government Commission Network

Avast –  Avast –  We have found a new targeted attack against a small, lesser-known U.S. federal government commission associated with international rights. Despite repeated attempts through multiple channels over…

The Log4j Vulnerability Is Now Used by State-Backed Hackers

The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…

Importance Of Medical Alert Devices In 2021

Whether you live a busy life or not, it is difficult to always be by someone’s side and to make sure that they are safe and that their needs are…

Cobalt Strike Is Being Installed by Emotet for Faster Attacks

Emotet belongs to the malware strain known as banking Trojans, and it primarily spreads through malspam. The messages used by Emotet often contain familiar branding, mimicking the email format of well-known…

Nation-state hackers aim to exploit Log4j software flaw, Microsoft warns

Written by AJ Vicens and Tim Starks Dec 15, 2021 | CYBERSCOOP Hackers associated with the governments of China, Iran, North Korea and Turkey have been trying to find ways…

CEO Fraud Emails – Not Every Money Transfer Request You Receive Is Legit

You know the saying If it’s too good to be true, then it probably is? The same could go with If it’s too pressing to be true, it probably is…

A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

New Ransomware Family Deployed in Log4Shell Attacks

Recently a public exploit for the major zero-day vulnerability known as ‘Log4Shell’ in the Apache Log4j Java-based logging platform has been made available. Log4j is a development platform that enables…

Log4j flaw: Now state-backed hackers are using bug as part of attacks, warns Microsoft

State-sponsored hackers from China, Iran, North Korea and Turkey have started testing, exploiting and using the Log4j bug to deploy malware, including ransomware, according to Microsoft.    As predicted by…

Actively Exploited Microsoft Zero-Day Allows App Spoofing, Malware Delivery

December’s Patch Tuesday updates address six publicly known bugs and seven critical security vulnerabilities. Microsoft has addressed a zero-day vulnerability that was exploited in the wild to deliver Emotet, Trickbot…