New destructive wiper malware linked to recent Iranian railway attack
The Meteor wiper was developed in the past three years and seems to be designed for reuse in multiple campaigns.
The Meteor wiper was developed in the past three years and seems to be designed for reuse in multiple campaigns.
The threat actor used alluring social media persona to infect the machine of an employee of the US aerospace defense contractor with the LEMPO malware.
CVE-2019-19781 was the most exploited flaw in 2020.
The latest version of PlugX has a variety of plug-ins that allow hackers to monitor, update and interact with the compromised system.
The BlackMatter group is currently seeking affiliates via ads for recruiting “initial access brokers,” posted on well-known hacker forums Exploit and XSS.
The hacker group relies on a custom malware toolset built specifically for IIS web servers to perform credential harvesting, reconnaissance and lateral movement.
The company has been forced to halt operations at container terminals in Durban, Ngqura, Port Elizabeth and Cape Town.
Pavel Tsurkan is scheduled to be sentenced on November 10, 2021 and faces a maximum penalty of 10 years in prison.
Scammers are also trying to take advantage of the excitement around Windows 11.
Since the beginning of this year Apple fixed a dozen zero-day vulnerabilities in iOS and macOS.
Showing elements 2931 - 2940