Cybersecurity Threats | Malware Exploitation | Ransomware Attacks Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware
Advanced Persistent Threats | Cybersecurity Threats | Malware Techniques Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Remote Code Execution | Security Vulnerabilities | Software Updates New Zoom and Xerox security updates address privilege escalation and remote code execution (RCE)
Microsoft Software Updates | Privilege Escalation | Security Vulnerabilities Microsoft addresses 111 new vulnerabilities including Kerberos zero-day flaw
Cloud Security | Cybersecurity | Vulnerability Management Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup
Exploits | Security Management | Vulnerabilities Zero-Day Vulnerabilities in HashiCorp Vault Allow Attackers to Execute Code Remotely
Cloud Security | Cybersecurity Vulnerabilities | Privilege Escalation Techniques Scientists have discovered a vulnerability in ECScape related to Amazon ECS that allows for the theft of credentials across different tasks.
Cybersecurity Vulnerability | Microsoft Exchange Server | Privilege Escalation A newly discovered vulnerability in Microsoft Exchange Server allows attackers to acquire administrative privileges.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Evasion Strategies | Exploitation Techniques | Malware Threats Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.