Aggregator
RansomHub Refines Extortion Strategy as RaaS Market Fractures
Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit
Tom Sheehan (Hurricane Labs Director of Cybersecurity Consulting and Compliance) attended the inaugural Horizon3 Global Partner summit last week. This event brought together the brightest minds and boldest innovators in cybersecurity for a day of education, collaboration, and vision. Held in Frisco Texas, the event spotlighted Horizon3.ai’s evolving impact on security, showcasing a community [...]
The post Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit appeared first on Hurricane Labs.
The post Driving the Future of Cybersecurity: Highlights from the Horizon3 Global Partner Summit appeared first on Security Boulevard.
Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a disturbingly effective method involving fake software downloads, such as a counterfeit “WinSCP” installer, propagated through malicious ads on platforms like Bing. One documented case revealed a user searching for “WinSCP download” via Microsoft Edge being […]
The post Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Debunking Security 'Myths' to Address Common Gaps
Google 称政府更频繁的使用 0day
CVE-2022-42058 | Tenda AC1200 15.11.0.10(1576) setRemoteWebManage stack-based overflow
CVE-2022-41396 | Tenda AC1200 15.11.0.10(1576) setIPsecTunnelList IPsecLocalNet/IPsecRemoteNet command injection
CVE-2022-41395 | Tenda AC1200 15.11.0.10(1576) setDMZ dmzHost command injection
CVE-2022-42053 | Tenda AC1200 15.11.0.10(1576) setPortMapping PortMappingServer command injection
CVE-2022-45381 | Pipeline Utility Steps Plugin up to 2.13.1 on Jenkins Controller File System path traversal
CVE-2022-45380 | JUnit Plugin up to 1159.v0b_396e1e07dd on Jenkins cross site scripting
CVE-2022-29275 | insyde Kernel UsbCoreDxe memory corruption
CVE-2022-29276 | insyde Kernel AhciBusDxe memory corruption
CVE-2022-29278 | insyde Kernel NvmExpressDxe Driver memory corruption
CVE-2022-29279 | insyde Kernel SdMmcDevice memory corruption
CVE-2022-30283 | insyde Kernel UsbCoreDxe buffer overflow
CVE-2022-43265 | Canteen Management System 1.0 /pages/save_user.php unrestricted upload
CVE-2022-29277 | insyde Kernel FwBlockServiceSmm Driver out-of-bounds write
Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according to the Federal Trade Commission (FTC), resulted in a record-breaking loss of US$5.7 billion in 2024-a 24% surge from the previous year. These scams, often disguised as legitimate opportunities such as cryptocurrency exchanges, leverage advanced […]
The post Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.