Skip to content
Home » News » Malware and Vulnerabilities

Malware and Vulnerabilities

New about Malware and Vulnerabilities. This will cover bot hVirus activity and how the work.

How Data Exfiltration Works and Why You Should Be Worried

Data exfiltration is the unauthorized transfer of data from a computer or network. It is a type of data leak, and it can happen through a variety of means. Common methods of data exfiltration include email, removable media, and file sharing. Data exfiltration is a serious concern for any organization that stores sensitive data. A dataRead More »How Data Exfiltration Works and Why You Should Be Worried

Sadly, Microsoft warns Log4j attacks are on the rise

Microsoft has cautioned Windows and Azure clients to stay watchful subsequent to noticing state-supported and digital criminals examining frameworks for the Log4j ‘Log4Shell’ defect through December. Uncovered by the Apache Software Foundation on December 9, Log4Shell will probably require a very long time to remediate on account of how error-logging software component is utilized in applicationsRead More »Sadly, Microsoft warns Log4j attacks are on the rise

RedLine making a b-line to your stored passwords

The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera. We tell clients to stop storing their passwords in browsers and to use a Locker. AhnLab ASEC warns that using the auto-login to get on to your sites is becoming a very large security problem affecting both organizations and individuals. AhnLab ASECRead More »RedLine making a b-line to your stored passwords

Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft

Writen by: Jai Vijayan Security experts are now urging organizations to quickly update to a new version of the Log4j logging framework that the Apache Foundation released Tuesday because its original fix for a critical remote-code execution flaw in the logging tool does not adequately protect against attacks in some situations. According to the Apache Foundation,Read More »Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft

Revived Cerber Targets Confluence and GitLab Servers

Story reported by Cyware. Cerber ransomware is active again with new attack tactics. This time it has been observed targeting remote code execution vulnerabilities in Atlassian Confluence and GitLab servers. Cerber name resurfaces Since last month, the Cerber ransomware group has started targeting victims around the world. The ransomware operators were found using both Windows and Linux encryptors. TheRead More »Revived Cerber Targets Confluence and GitLab Servers