New Epsilon Red ransomware uses unpatched MS Exchange servers as entry point into enterprise networks
Epsilon Red is written in Golang and uses a set of unique PowerShell scripts that prepare the ground for the file-encryption routine.
Epsilon Red is written in Golang and uses a set of unique PowerShell scripts that prepare the ground for the file-encryption routine.
The threat actor breached a Constant Contact account and sent out phishing emails to nearly 3,000 accounts across more than 150 organizations.
The exposed information dates from July 2016 to March 2019 and most of it contained the name and address of the receiving customer.
The Transportation Security Administration directive is designed to help DHS better identify, protect against, and respond to threats to critical companies in the pipeline sector.
Fujitsu temporarily suspended the ProjectWEB platform to “prevent further unauthorized access.”
Le Monde Parallèle is the third major French dark web platform dismantled in the last four years.
Trend Micro analyzed data belonging to a few TeamTNT servers, which gave the research team an insight into what tools and techniques the group used.
Dubbed Agrius, the group has been active since early 2020 primarily targeting entities in the Middle East region, but in December 2020 the threat actor switched its focus to Israel.
The intrusion, which was discovered in March 2021, was traced back to April 2019.
Kirill Firsov has already spent 15 months in custody, and after serving the remaining 15 months, he will be deported to Russia.
Showing elements 3031 - 3040